Publications

From Internet to Emulator: A Virtual Testbed for Internet Routing Protocols

The ongoing evolution and expansion of the Internet demands resilient, secure and scalable routing protocols to provide seamless connectivity across global networks. However, the lack of a realistic testbed for...



Responsible Information Sharing in the era of Big Data Analytics facilitating Digital Economy through the use of Blockchain technology and observing GDPR

In the contemporary digital landscape, the intersection of big data analytics, data ownership, and GDPR compliance emerges as a critical arena. This paper proposes a transformative framework to redefine data...




Battery Depletion Attack Through Packet Injection on IoT Thread Mesh Network

In the rapidly expanding landscape of Internet of Things (IoT) device manufacturing and deployment, concerns about security have become prominent. This demonstration involves practical attacks on a thread-mesh network within...


Future Capability Paper: Wireless Networking

Wireless technology has revolutionised society, providing unparalleled mobility through devices like smartphones, tablets, laptops, and smart home gadgets. The Internet of Things (IoT) has further connected billions of devices, fostering...


Improving Link Resilience in Software Defined IoT Networking

Deploying new optimized routing policies on routers in the event of link failure is difficult due to strong coupling between the data and control planes and the absence of topology...


Federated benchmarking of medical artificial intelligence with MedPerf

Medical artificial intelligence (AI) has tremendous potential to advance healthcare by supporting and contributing to the evidence-based practice of medicine, personalizing patient treatment, reducing costs, and improving both healthcare provider...


Mitigating IoT Botnet DDos Attacks through MUD and eBPF based Traffic Filtering

As the prevalence of Internet-of-Things (IoT) devices becomes more and more dominant, so too do the associated management and security challenges. One such challenge is the exploitation of vulnerable devices...