A novel scheduling algorithm for improved performance of multi-objective safety-critical wireless sensor networks using long short-term memory

Article


Al-Nader, I., Lasebae, A., Raheem, R. and Khoshkholghi, A. 2023. A novel scheduling algorithm for improved performance of multi-objective safety-critical wireless sensor networks using long short-term memory. Electronics. 12 (23). https://doi.org/10.3390/electronics12234766
TypeArticle
TitleA novel scheduling algorithm for improved performance of multi-objective safety-critical wireless sensor networks using long short-term memory
AuthorsAl-Nader, I., Lasebae, A., Raheem, R. and Khoshkholghi, A.
Abstract

The multiple objective optimisation (MOO) challenges encountered in the context of wireless sensor networks (WSNs) present a formidable NP-hard problem. These issues primarily arise from the constraints imposed by critical factors such as connectivity, coverage, and, most notably, energy consumption. Simultaneously fulfilling these three requirements is no longer considered the standard approach for enhancing system dependability. To illustrate, a prospective solution may optimise one or two of these requirements while bolstering overall network energy efficiency. Nonetheless, prior endeavours documented in the extant literature reveal unexplored avenues for enhancement. Hence, this paper introduces a new methodology aimed at alleviating MOO concerns and thereby enhancing the quality of service (QoS) in WSNs. A long short-term memory (LSTM) model is proposed as an analytical tool to deliver an energy-efficient scheduling solution that aligns and optimises WSN parameters, striving to attain the most favourable system performance. The LSTM algorithm’s effectiveness is assessed through the iterative application of periods, confirming the desired QoS levels. The unique feature of LSTM lies in its capability to observe specific event sequences and subsequently establish them as the system’s default configuration for its entire operational lifespan. Once these favourable parameters are identified, LSTM automatically ensures consistent service availability and reliability throughout the network’s lifespan. The results obtained demonstrate the superiority of the proposed LSTM-based scheduling algorithm in comparison to the self-organising map (SOFM)-based node scheduling algorithm. The LSTM-based approach outperforms the SOFM-based alternative by a remarkable 75% in terms of coverage and exhibits a 20% enhancement in network lifetime, all while maintaining equivalent levels of connectivity (i.e., 99%) in both algorithms.

KeywordsWSN; dependable WSN; recurrent neural network; real-time systems; QoS in WSN; SOFM
Sustainable Development Goals9 Industry, innovation and infrastructure
Middlesex University ThemeSustainability
PublisherMDPI AG
JournalElectronics
ISSN
Electronic2079-9292
Publication dates
Online24 Nov 2023
Print01 Dec 2023
Publication process dates
Accepted18 Dec 2023
Submitted17 Oct 2023
Deposited07 Mar 2024
Output statusPublished
Publisher's version
License
File Access Level
Open
Copyright Statement

© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/)

Digital Object Identifier (DOI)https://doi.org/10.3390/electronics12234766
Web of Science identifierWOS:001115990800001
LanguageEnglish
Permalink -

https://repository.mdx.ac.uk/item/x9708

Download files


Publisher's version
electronics-12-04766-v2.pdf
License: CC BY 4.0
File access level: Open

  • 60
    total views
  • 21
    total downloads
  • 1
    views this month
  • 2
    downloads this month

Export as

Related outputs

Dissecting the hype: a study of WallStreetBets’ sentiment and network correlation on financial markets
Wang, K, Wong, B, Khoshkholghi, A., Shah, P., Naha, R, Mahanti, A and Kim, J 2024. Dissecting the hype: a study of WallStreetBets’ sentiment and network correlation on financial markets. 38th International Conference on Advanced Information Networking and Applications. Kitakyushu, Japan 17 - 19 Apr 2024 Springer. pp. 263-273 https://doi.org/10.1007/978-3-031-57853-3_22
A novel bio-inspired bat node scheduling algorithm for dependable safety-critical wireless sensor network systems
Al-Nader, I., Lasebae, A., Raheem, R. and Ngondi, G. 2024. A novel bio-inspired bat node scheduling algorithm for dependable safety-critical wireless sensor network systems. Sensors. 24 (6). https://doi.org/10.3390/s24061928
A novel scheduling algorithm for improved performance of multi-objective safety-critical WSN using spatial self-organizing feature map
Al-Nader, I., Lasebae, A. and Raheem, R. 2024. A novel scheduling algorithm for improved performance of multi-objective safety-critical WSN using spatial self-organizing feature map. Electronics. 13 (1). https://doi.org/10.3390/electronics13010019
A new perceptron based neural-network algorithm to enhance the scheduling performance of safety-critical WSNs of increased dependability
Al-Nader, I, Lasebae, A. and Raheem, R. 2024. A new perceptron based neural-network algorithm to enhance the scheduling performance of safety-critical WSNs of increased dependability. So In, C., Londhe, N.D., Bhatt, N. and Kitsing, M. (ed.) 8th World Conference on Information Systems for Business Management. Bangkok, Thailand 07 - 08 Sep 2023 Springer. pp. 347-366 https://doi.org/10.1007/978-981-99-8612-5_28
Information fusion-based cybersecurity threat detection for intelligent transportation system
Chowdhury, A., Naha, R., Kaisar, S., Khoshkholghi, A., Ali, K. and Galletta, A. 2023. Information fusion-based cybersecurity threat detection for intelligent transportation system. CCGridW: 4th Workshop on Secure IoT, Edge and Cloud Systems (SioTEC) 2023. Bangalore, India 01 - 04 May 2023 Bangalore, India IEEE. pp. 96-103 https://doi.org/10.1109/CCGridW59191.2023.00029
Analyzing land cover and land use changes using remote sensing techniques: a temporal analysis of climate change detection with Google Earth engine
Afzal, M., Ali, K., Kasi, M., Rehman, M., Khoshkholghi, A., Haq, B. and Shah, S. 2023. Analyzing land cover and land use changes using remote sensing techniques: a temporal analysis of climate change detection with Google Earth engine. IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications. Exeter, United Kingdom 01 - 03 Nov 2023 IEEE. pp. 2018-2023 https://doi.org/10.1109/TrustCom60117.2023.00277
Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications
Chowdhury, A., Isalm, M., Kaisar, S., Naha, R., Khoshkholghi, A., Aiash, M. and Khoda, M.E. 2023. Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications. IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications. Exeter, United Kingdom 01 - 03 Nov 2023 IEEE. pp. 2216-2221
Using Hidden Markov Chain for improving the dependability of safety-critical WSNs
Al-Nader, I., Lasebae, A. and Raheem, R. 2023. Using Hidden Markov Chain for improving the dependability of safety-critical WSNs. Barolli, L. (ed.) 37th International Conference on Advanced Information Networking and Applications. Federal University of Juiz de Fora, Brazil 29 - 31 Mar 2023 Cham, Switzerland. Springer. pp. 460–472 https://doi.org/10.1007/978-3-031-29056-5_40
Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain
Edris, E., Aiash, M., Khoshkholghi, A., Naha, R., Chowdhury, A. and Loo, J. 2023. Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet of Things. 24. https://doi.org/10.1016/j.iot.2023.100913
IoT-based emergency vehicle services in intelligent transportation system
Chowdhury, A., Kaisar, S., Khoda, M., Naha, R., Khoshkholghi, A. and Aiash, M. 2023. IoT-based emergency vehicle services in intelligent transportation system. Sensors. 23 (11). https://doi.org/10.3390/s23115324
Efficient design for smart environment using Raspberry Pi with Blockchain and IoT (BRIoT)
Ponugumati, S., Ali, K., Lasebae, A., Zahoor, Z., Kiyani, A., Khoshkholghi, A. and Maddu, L. 2023. Efficient design for smart environment using Raspberry Pi with Blockchain and IoT (BRIoT). CCGridW: 4th Workshop on Secure IoT, Edge and Cloud Systems (SioTEC) 2023. Bangalore, India 01 - 04 May 2023 IEEE. pp. 75-80 https://doi.org/10.1109/CCGridW59191.2023.00026
Federated learning for performance prediction in multi-operator environments
Lan, X., Taghia, J., Moradi, F., Khoshkholghi, A., Listo Zec, E., Mogren, O., Mahmoodi, T. and Johnsson, A. 2023. Federated learning for performance prediction in multi-operator environments. ITU Journal on Future and Evolving Technologies. 4 (1), pp. 166-177. https://doi.org/10.52953/PFYZ9165
xURLLC in 6G with meshed RAN
Khoshkholghi, A., Mahmoodi, T., Pal, S., Chopra, S., Tendulkar, M. and Sarka, S. 2022. xURLLC in 6G with meshed RAN. ITU Journal on Future and Evolving Technologies. 3 (3), pp. 612-622. https://doi.org/10.52953/JTPE9471
Edge intelligence for service function chain deployment in NFV-enabled networks
Khoshkholghi, A. and Mahmoodi, T. 2022. Edge intelligence for service function chain deployment in NFV-enabled networks. Computer Networks. 219. https://doi.org/10.1016/j.comnet.2022.109451
IntOpt: in-band network telemetry optimization framework to monitor network slices using P4
Bhamare, D., Kassler, A., Vestin, J., Khoshkholghi, A., Taheri, J., Mahmoodi, T., Ohlen, P. and Curescu, C. 2022. IntOpt: in-band network telemetry optimization framework to monitor network slices using P4. Computer Networks. 216. https://doi.org/10.1016/j.comnet.2022.109214
Novel group handover mechanism for cooperative and coordinated mobile femtocells technology in railway environment
Raheem, R., Lasebae, A. and Raheem, A. 2022. Novel group handover mechanism for cooperative and coordinated mobile femtocells technology in railway environment. Array. 15. https://doi.org/10.1016/j.array.2022.100223
Estimation of ransomware payments in Bitcoin ecosystem
Raheem, A., Raheem, R., Chen, T. and Alkhayyat, A. 2021. Estimation of ransomware payments in Bitcoin ecosystem. 12th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2021). New York City, NY, USA 30 Sep - 03 Oct 2021 IEEE. pp. 1667-1674 https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00224
Cooperative and coordinated Mobile Femtocells technology in high-speed vehicular environments: mobility and interference management
Raheem, R., Lasebae, A., Petridis, M. and Raheem, A. 2021. Cooperative and coordinated Mobile Femtocells technology in high-speed vehicular environments: mobility and interference management. Barolli, L., Woungang, I. and Enokido, T. (ed.) 35th International Conference on Advanced Information Networking and Applications (AINA-2021). Ryerson University, Toronto, Canada (Held Online) 12 - 14 May 2021 Springer. pp. 653-666 https://doi.org/10.1007/978-3-030-75100-5_56
Robust continuous user authentication system using long short term memory network for healthcare
Tanveer, A., Lasebae, A., Ali, K., Alkhayyat, A., Ur-Rehman, M., Haq, B. and Naeem, B. 2021. Robust continuous user authentication system using long short term memory network for healthcare. Ur-Rehman, M. and Zoha, A. (ed.) 16th EAI International Conference on Body Area Networks. Glasgow, UK (Online) 25 - 26 Oct 2021 Cham Springer. https://doi.org/10.1007/978-3-030-95593-9_22
Heuristic edge server placement in Industrial Internet of Things and cellular networks
Kasi, S., Kasi, M., Ali, K., Raza, M., Afzal, H., Lasebae, A., Naeem, B., Islam, S. and Rodrigues, J. 2021. Heuristic edge server placement in Industrial Internet of Things and cellular networks. IEEE Internet of Things Journal. 8 (13), pp. 10308-10317. https://doi.org/10.1109/JIOT.2020.3041805
Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach
Kiyani, A., Lasebae, A., Ali, K., Ur-Rehman, M. and Haq, B. 2020. Continuous user authentication featuring keystroke dynamics based on robust recurrent confidence model and ensemble learning approach. IEEE Access. 8, pp. 156177-156189. https://doi.org/10.1109/ACCESS.2020.3019467
Intrusion detection and classification with autoencoded deep neural network
Rezvy, S., Petridis, M., Lasebae, A. and Zebin, T. 2019. Intrusion detection and classification with autoencoded deep neural network. Lanet, J. and Toma, C. (ed.) SecITC 2018: International Conference on Security for Information Technology and Communications. Bucharest, Romania 08 - 09 Nov 2018 Switzerland Springer Nature. https://doi.org/10.1007/978-3-030-12942-2_12
An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks
Rezvy, S., Luo, Y., Petridis, M., Lasebae, A. and Zebin, T. 2019. An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks. 2019 53rd Annual Conference on Information Sciences and Systems (CISS). Baltimore, MD, USA, USA 20 - 22 Mar 2019 IEEE. pp. 1-6 https://doi.org/10.1109/CISS.2019.8693059
The impacts of internal threats towards routing protocol for low power and lossy network performance
Le, A., Loo, J., Luo, Y. and Lasebae, A. 2013. The impacts of internal threats towards routing protocol for low power and lossy network performance. 2013 IEEE Symposium on Computers and Communications (ISCC). https://doi.org/10.1109/ISCC.2013.6755045
A progressive approach to design authentication protocols for mobile heterogeneous networks
Kenaza, T., Aiash, M., Loo, J., Lasebae, A. and Whitney, G. 2016. A progressive approach to design authentication protocols for mobile heterogeneous networks. IEEE Trustcom/BigDataSE/I​SPA, 2016. Tianjin, China 23 - 26 Aug 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 1776-1781 https://doi.org/10.1109/trustcom.2016.0273
A security framework for node-to-node communications based on the LISP architecture
Kallash, M., Loo, J., Lasebae, A. and Aiash, M. 2018. A security framework for node-to-node communications based on the LISP architecture. International Journal of Electronic Security and Digital Forensics. 10 (3), pp. 276-291. https://doi.org/10.1504/IJESDF.2018.093024
Mobile femtocell utilisation in LTE vehicular environment: vehicular penetration loss elimination and performance enhancement
Raheem, R., Lasebae, A., Aiash, M., Loo, J. and Colson, R. 2017. Mobile femtocell utilisation in LTE vehicular environment: vehicular penetration loss elimination and performance enhancement. Vehicular Communications. 9 (12), pp. 31-42. https://doi.org/10.1016/j.vehcom.2017.02.003
Interference management and system optimisation for Femtocells technology in LTE and future 4G/5G networks
Raheem, R. 2016. Interference management and system optimisation for Femtocells technology in LTE and future 4G/5G networks. PhD thesis Middlesex University Computer Science
Interference Management and System Optimisation for Femtocells Technology in LTE and Future 4G/5G Networks
Raheem, R., Lasebae, A., Aiash, M., Loo, J., Colson, R. and Raheem, A. 2017. Interference Management and System Optimisation for Femtocells Technology in LTE and Future 4G/5G Networks. in: Yurish, S. (ed.) Advances in Networks, Security and Communications: Reviews - Volume 1 International Frequency Sensor Association Publishing.
Mobility management for vehicular user equipment in LTE/mobile femtocell networks
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2017. Mobility management for vehicular user equipment in LTE/mobile femtocell networks. International Journal of Information Systems in the Service Sector. 9 (4), pp. 60-87. https://doi.org/10.4018/IJISSS.2017100105
Performance evaluation of mobile users served by fixed and mobile femtocells in LTE networks
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2016. Performance evaluation of mobile users served by fixed and mobile femtocells in LTE networks. Journal of Networking Technology. 7 (1), pp. 16-33.
Interference management for co-channel mobile femtocells technology in LTE networks
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2016. Interference management for co-channel mobile femtocells technology in LTE networks. 2016 12th International Conference on Intelligent Environments (IE). London, United Kingdom 14 - 16 Sep 2016 IEEE. pp. 80-87 https://doi.org/10.1109/IE.2016.21
Performance evaluation of wireless IEEE 802.11(b) used for ad-hoc networks in an e-learning classroom network
Ghosh, A., Lasebae, A. and Ever, E. 2009. Performance evaluation of wireless IEEE 802.11(b) used for ad-hoc networks in an e-learning classroom network. 3rd IT Student Conference for the Next Generation. University of East London, London, UK 21 - 22 Nov 2009
A secure authentication protocol for IP-based wireless sensor communications using the location/ID split protocol (LISP)
Raheem, A., Lasebae, A. and Loo, J. 2014. A secure authentication protocol for IP-based wireless sensor communications using the location/ID split protocol (LISP). 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Beijing, China Institute of Electrical and Electronics Engineers (IEEE). pp. 840-845 https://doi.org/10.1109/TrustCom.2014.135
Supporting communications in the IOTs using the location/ID split protocol: a security analysis
Lasebae, A., Loo, J., Aiash, M. and Raheem, A. 2013. Supporting communications in the IOTs using the location/ID split protocol: a security analysis. Future Generation Communication Technology (FGCT) 4- date of conference in full: 12-14 Nov. 2013. London, UK 12 - 14 Nov 2013 pp. 1-5
System capacity Improvement by on request channel allocation in LTE cellular network
Lasebae, A., Rahman, S. and Rezvy, S. 2014. System capacity Improvement by on request channel allocation in LTE cellular network. The 15th IEEE International Conference on a World of Wireless, Mobile and Multimedia Networks. Sydney, Australia 16 - 19 Jun 2014
Instant channel allocation technique to improve system throughput in joint LTE network
Rezvy, S., Rahman, S., Lasebae, A. and Loo, J. 2014. Instant channel allocation technique to improve system throughput in joint LTE network. The 28th IEEE International Conference on Advanced Information Networking and Applications. Victoria, BC, Canada 03 - 16 May 2014 IEEE. pp. 900-904 https://doi.org/10.1109/WAINA.2014.198
System capacity improvement by on request channel allocation in LTE cellular network
Rezvy, S., Rahman, S., Lasebae, A. and Loo, J. 2014. System capacity improvement by on request channel allocation in LTE cellular network. 48th Annual Conference on Information Sciences and Systems (CISS-2014). Princeton, New Jersey, USA 19 - 21 Mar 2014 Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/CISS.2014.6814105
On demand based frequency allocation to mitigate interference in femto-macro LTE cellular network
Rezvy, S., Rahman, S., Lasebae, A. and Loo, J. 2013. On demand based frequency allocation to mitigate interference in femto-macro LTE cellular network. Second International Conference on Future Generation Communication Technologies (FGCT- 2013). London, UK 12 - 14 Nov 2013 Institute of Electrical and Electronics Engineers (IEEE). pp. 213-218
Downlink femto-macro ICI cancellation by on request channel allocation in LTE network
Rezvy, S., Rahman, S., Lasebae, A. and Loo, J. 2014. Downlink femto-macro ICI cancellation by on request channel allocation in LTE network. 48th Annual Conference on Information Sciences and Systems (CISS-2014). Princeton University, New Jersey, USA 19 - 21 Mar 2014
Mobility management in LTE/mobile femtocell networks: outage probability and drop/block calls probability
Raheem, R., Lasebae, A. and Loo, J. 2015. Mobility management in LTE/mobile femtocell networks: outage probability and drop/block calls probability. 3rd International Conference on Emerging Research Paradigms in Business and Social Sciences. Dubai, UAE 24 - 26 Nov 2015
A secure framework for communications in heterogeneous networks
Aiash, M., Mapp, G., Lasebae, A. and Loo, J. 2014. A secure framework for communications in heterogeneous networks. WAINA 2014 28th International Conference on Advanced Information Networking and Applications Workshops. Victoria, BC 13 - 16 May 2014 pp. 841-846
Comparison between resource reservation protocol and next steps in signalling in mobile IP networks
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2014. Comparison between resource reservation protocol and next steps in signalling in mobile IP networks. IET Networks. https://doi.org/10.1049/iet-net.2013.0028
SLA based MT-routing for future internet
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2014. SLA based MT-routing for future internet. Wireless World Research Forum Meeting 32. Marrakech, Morocco 18 - 22 May 2014
An efficient traffic engineering based on multi-topology routing for future internet
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2014. An efficient traffic engineering based on multi-topology routing for future internet. Computer Networks. https://doi.org/10.1016/j.comnet.2014.05.008
LOC algorithm: location-aware opportunistic forwarding by using node's approximate location
Khan, S., Loo, J., Lasebae, A., Azam, M., Adeel, M., Kausar, R. and Sardar, H. 2014. LOC algorithm: location-aware opportunistic forwarding by using node's approximate location. International Journal of Pervasive Computing and Communications. 10 (4), pp. 481-496. https://doi.org/10.1108/IJPCC-02-2014-0017
Performance evaluation of LTE network via using fixed/mobile femtocells
Raheem, R., Lasebae, A. and Loo, J. 2014. Performance evaluation of LTE network via using fixed/mobile femtocells. Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference. Victoria, BC, Canada 13 - 16 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 255-260 https://doi.org/10.1109/WAINA.2014.51
Instant channel allocation technique to improve system throughput in joint LTE cellular network
Rezvy, S., Rahman, S., Lasebae, A. and Loo, J. 2014. Instant channel allocation technique to improve system throughput in joint LTE cellular network. Advanced Information Networking and Applications Workshops (WAINA 2014). Victoria, Canada 13 - 16 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 900-904 https://doi.org/10.1109/WAINA.2014.198
LOC algorithm: location-aware opportunistic forwarding by using node's approximate location
Kashif Ashraf Khan, S., Loo, J., Lasebae, A., Awais Azam, M., Adeel, M., Kausar, R. and Sardar, H. 2014. LOC algorithm: location-aware opportunistic forwarding by using node's approximate location. International Journal of Pervasive Computing and Communications. 10 (4), pp. 481-496. https://doi.org/10.1108/IJPCC-02-2014-0017
Concern level assessment: building domain knowledge into a visual system to support network-security situation awareness
Kodagoda, N., Attfield, S., Choudhury, S., Rooney, C., Mapp, G., Nguyen, P., Slabbert, L., Wong, B., Aiash, M., Zheng, Y., Xu, K. and Lasebae, A. 2014. Concern level assessment: building domain knowledge into a visual system to support network-security situation awareness. Information Visualization. 13 (4), pp. 346-360. https://doi.org/10.1177/1473871613490291
Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents
Georgiades, A., Luo, Y., Lasebae, A. and Comley, R. 2009. Location privacy in mobile IPv6 distributed authentication protocol using mobile home agents. Trilling, L., Perkins, D., Dionysios, D., Perlovsky, L., Davey, K., Landgrebe, D., Marino, M., Russell, D., Collicott, S., Ceccarelli, M. and Lund, J. (ed.) The 8th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications (EHAC '09). Cambridge, UK 21 - 23 Feb 2009 WSEAS Press. pp. 51-56
Specification-based IDS for securing RPL from topology attacks
Le, A., Loo, J., Luo, Y. and Lasebae, A. 2011. Specification-based IDS for securing RPL from topology attacks. Wireless Days (WD), 2011 IFIP. https://doi.org/10.1109/WD.2011.6098218
Introducing mobile home agents into the distributed authentication protocol to achieve location privacy in mobile IPv6
Georgiades, A., Luo, Y., Lasebae, A. and Comley, R. 2008. Introducing mobile home agents into the distributed authentication protocol to achieve location privacy in mobile IPv6. International Journal of Communications. 2 (3), pp. 185-194.
Integrating mobility, quality-of-service and security in future mobile networks
Aiash, M., Mapp, G., Lasebae, A., Phan, R. and Loo, J. 2013. Integrating mobility, quality-of-service and security in future mobile networks. in: Ao, S. and Gelman, L. (ed.) Electrical Engineering and Intelligent Systems New York Springer.
An efficient resource reservation for domain based mobile IP networks: analytical approach
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2013. An efficient resource reservation for domain based mobile IP networks: analytical approach. IEEE 77th Vehicular Technology Conference (VTC2013-Spring). Dresden, Germany 02 - 05 Jun 2013
From fixed to mobile femtocells in LTE systems: issues and challenges
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2013. From fixed to mobile femtocells in LTE systems: issues and challenges. 2013 Second International Conference on Future Generation Communication Technology (FGCT). London, United Kingdom 12 - 14 Nov 2013 Institute of Electrical and Electronics Engineers (IEEE). pp. 207-212 https://doi.org/10.1109/FGCT.2013.6767218
Efficient NSIS mobility support for mobile networks
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2013. Efficient NSIS mobility support for mobile networks. IEEE 24th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). London, UK 08 - 11 Sep 2013 IEEE. pp. 3354-3359 https://doi.org/10.1109/PIMRC.2013.6666727
Using aggregated RSVP in nested HMIPv6
Mirzamany, E., Lasebae, A. and Gemikonakli, O. 2012. Using aggregated RSVP in nested HMIPv6. Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International. IEEE. pp. 716 -721 https://doi.org/10.1109/IWCMC.2012.6314292
A formally verified device authentication protocol using Casper/FDR
Aiash, M., Mapp, G., Phan, R., Lasebae, A. and Loo, J. 2012. A formally verified device authentication protocol using Casper/FDR. Min, G., Wu, Y., Liu, L., Jin, X., Jarvis, S. and Al-Dubai, A. (ed.) 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012). Liverpool, UK 25 - 27 Jun 2012 IEEE. pp. 1293-1298 https://doi.org/10.1109/TrustCom.2012.27
A survey of potential architectures for communication in heterogeneous networks
Aiash, M., Mapp, G., Lasebae, A., Loo, J., Sardis, F., Phan, R., Augusto, M., Moreira, E. and Vanni, R. 2012. A survey of potential architectures for communication in heterogeneous networks. IEEE Wireless Telecommunications Symposium (WTS 2012). London 18 - 20 Apr 2012 IEEE. pp. 1-6 https://doi.org/10.1109/WTS.2012.6266121
Evaluation of wireless IEEE 802.11(b) used for ad-hoc networks in an e-learning classroom network
Ghosh, A., Lasebae, A. and Ever, E. 2009. Evaluation of wireless IEEE 802.11(b) used for ad-hoc networks in an e-learning classroom network. Kaspersky IT Security Conference for the Next Generation.
Security and QoS integration for protecting service providers in hterogeneous environments
Aiash, M., Mapp, G. and Lasebae, A. 2011. Security and QoS integration for protecting service providers in hterogeneous environments. International Journal of Computer Science. 38 (4), pp. 384-393.
Analoge and digital signal transmission utilizing GPON-CWDM based RoF over long distance
Al Noor, M., Loo, J., Raheem, R. and Al-Dahlaki, A. 2012. Analoge and digital signal transmission utilizing GPON-CWDM based RoF over long distance. 2012 International Conference on Future Communication Networks. Baghdad, Iraq 02 - 05 Apr 2012 Institute of Electrical and Electronics Engineers (IEEE). pp. 175-180 https://doi.org/10.1109/ICFCN.2012.6206864
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach
Le, A., Loo, J., Lasebae, A., Aiash, M. and Luo, Y. 2012. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication Systems. 25 (9), pp. 1189-1212. https://doi.org/10.1002/dac.2356
M-Sieve: a visualisation tool for supporting network security analysts
Choudhury, S., Kodagoda, N., Nguyen, P., Rooney, C., Attfield, S., Xu, K., Zheng, Y., Wong, B., Chen, R., Mapp, G., Slabbert, L., Aiash, M. and Lasebae, A. 2012. M-Sieve: a visualisation tool for supporting network security analysts. VisWeek 2012. Seattle, WA, USA 14 - 19 Oct 2012
A formally verified AKA protocol for vertical handover inheterogeneous environments using Casper/FDR
Aiash, M., Mapp, G., Lasebae, A., Phan, R. and Loo, J. 2012. A formally verified AKA protocol for vertical handover inheterogeneous environments using Casper/FDR. EURASIP Journal on Wireless Communications and Networking. 2012 (57). https://doi.org/10.1186/1687-1499-2012-57
Stream bundle management layer for optimum management of co-existing telemedicine traffic streams under varying channel conditions in heterogeneous networks.
Shaikh, F., Lasebae, A., Mapp, G. and Middlesex University 2005. Stream bundle management layer for optimum management of co-existing telemedicine traffic streams under varying channel conditions in heterogeneous networks. MIT 2005. China
Proactive policy management for heterogeneous networks
Shaikh, F., Lasebae, A., Mapp, G. and Middlesex University 2008. Proactive policy management for heterogeneous networks. 3rd International Conference on Information and Communication Technologies: from Theory to Applications (ICTTA 2008). Umayyad Palace, Damascus, Syria 07 - 11 Apr 2008
Client-based SBM layer for predictive management of traffic flows in heterogeneous networks
Shaikh, F., Lasebae, A., Mapp, G. and Middlesex University 2006. Client-based SBM layer for predictive management of traffic flows in heterogeneous networks. 2nd IEEE International Conference on Information and Communication Technologies: from Theory to Applications (ICTTA 2006). Damascus, Syria 24 - 28 Apr 2006
A survey of network coverage prediction mechanisms in 4G heterogeneous wireless networks.
Shaikh, F., Mapp, G., Lasebae, A., British Institute of Technology and e-Commerce and Middlesex University 2011. A survey of network coverage prediction mechanisms in 4G heterogeneous wireless networks. First Global Conference on Communication, Science and Information Engineering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
Exploring the concept of scope to provide better security for internet services.
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Middlesex University and Loughborough University 2011. Exploring the concept of scope to provide better security for internet services. First Global Conference on Communication, Science and Engineering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
Enhancing naming and location services to support multi-homed devices in heterogeneous environments
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Augusto, M., Vanni, R., Moreira, E., Middlesex University, Loughborough University and University of Sao Paulo 2011. Enhancing naming and location services to support multi-homed devices in heterogeneous environments. First Conference on Communication, Science and Information Enginneering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
Proactive policy management using TBVH mechanism in heterogeneous networks.
Shaikh, F., Mapp, G., Lasebae, A. and Middlesex University 2007. Proactive policy management using TBVH mechanism in heterogeneous networks. Proceedings of the International Conference and Exhibition on 'Next Generation Mobile Application, Services and Technologies' (NGMAST 2007). Cardiff, Wales 12 - 14 Sep 2007
A QoS framework for heterogeneous networking
Aiash, M., Mapp, G., Lasebae, A., Augusto, M., Vanni, R. and Moreira, E. 2011. A QoS framework for heterogeneous networking. ICWN'11: The 2011 International Conference of Wireless Networks (held as part of WCE 2011). London, UK 06 - 08 Jul 2011
Investigation of a mechatronic device for the remedial treatment of brain injured children.
Lasebae, A. 1999. Investigation of a mechatronic device for the remedial treatment of brain injured children. PhD thesis Middlesex University School of Engineering Systems
Providing security in 4G systems: unveiling the challenges
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Middlesex University and Loughborough University 2010. Providing security in 4G systems: unveiling the challenges. Atmaca, T., Palicot, J., Amor, N., Tsiatsos, T., Marot, M. and Dini, O. (ed.) IEEE. pp. 439-444 https://doi.org/10.1109/AICT.2010.24
Security models for heterogeneous networking
Mapp, G., Aiash, M., Lasebae, A. and Phan, R. 2010. Security models for heterogeneous networking. Katsikas, S. (ed.) 4th International Conference on Security and Cryptography. Athens, Greece 26 - 28 Jul 2010 IEEE. pp. 1-4
Dual identity return routability for the security of mobile IPv6 binding updates within the distributed authentication protocol.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2006. Dual identity return routability for the security of mobile IPv6 binding updates within the distributed authentication protocol. in: WSEAS Conferences: Elounda, Agios Nikolaos, Crete, Greece, August 18-20, 2006 Athens WSEAS.
Distributed authentication protocol utilizing dual identity return routability for the security of binding updates within mobile IPv6.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2006. Distributed authentication protocol utilizing dual identity return routability for the security of binding updates within mobile IPv6. WSEAS transactions on communications. 5 (10), pp. 1109-2742.
Distributed authentication protocol for the security of binding updates in mobile IPv6.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Distributed authentication protocol for the security of binding updates in mobile IPv6. in: Proceedings of the 9th WSEAS international CSCC multiconference: circuits 05, systems 05, computers 05, communications 05. WSEAS.
Binding update security for mobile IPv6 using a distributed authentication protocol.
Luo, Y., Lasebae, A., Comley, R. and Georgiades, A. 2005. Binding update security for mobile IPv6 using a distributed authentication protocol. WSEAS transactions on communications. 4 (9), pp. 1109-2742.
Trinity protocol for authentication of binding updates in mobile IPv6.
Luo, Y., Comley, R., Lasebae, A. and Georgiades, A. 2004. Trinity protocol for authentication of binding updates in mobile IPv6. WSEAS transactions on communications. 3 (3), pp. 872-877.
Critical analysis of high speed wireless standards for transferring telementoring information
Shaikh, F., Lasebae, A. and Whitney, G. 2004. Critical analysis of high speed wireless standards for transferring telementoring information. in: ICTTA'04: 2004 International conference on information & communication technologies: from theory to applications. IEEE.