Skip to main content

Research Repository

Advanced Search

All Outputs (23)

Intelligent Digital Twin Communication Framework for Addressing Accuracy and Timeliness Tradeoff in Resource-Constrained Networks (2024)
Journal Article
Cakir, L. V., Thomson, C. J., Özdem, M., Canberk, B., Nguyen, V.-L., & Duong, T. Q. (online). Intelligent Digital Twin Communication Framework for Addressing Accuracy and Timeliness Tradeoff in Resource-Constrained Networks. IEEE Transactions on Cognitive Communications and Networking, https://doi.org/10.1109/tccn.2024.3469234

The accuracy and timeliness tradeoff prevents Digital Twins (DTs) from realizing their full potential. High accuracy is crucial for decision-making, and timeliness is equally essential for responsiveness. Therefore, this tradeoff in DT communication... Read More about Intelligent Digital Twin Communication Framework for Addressing Accuracy and Timeliness Tradeoff in Resource-Constrained Networks.

Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs) (2024)
Journal Article
Baird, I., Wadhaj, I., Ghaleb, B., & Thomson, C. (2024). Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs). Electronics, 13(16), Article 3314. https://doi.org/10.3390/electronics13163314

Mobile ad hoc networks (MANETs) offer a decentralized communication solution ideal for infrastructure-less environments like disaster relief zones. However, their inherent lack of central control and dynamic topology make them vulnerable to attacks.... Read More about Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs).

AI-based traffic analysis in digital twin networks (2024)
Book Chapter
Al-Shareeda, S., Huseynov, K., Cakir, L. V., Thomson, C., Ozdem, M., & Canberk, B. (2024). AI-based traffic analysis in digital twin networks. In H. Ahmadi, T. Q. Duong, A. Nag, V. Sharma, B. Canberk, & O. A. Dobre (Eds.), Digital Twins for 6G: Fundamental theory, technology and applications (83-132). Institution of Engineering and Technology (IET). https://doi.org/10.1049/pbte109e_ch4

In today’s networked world, Digital Twin Networks (DTNs) are revolutionizing how we understand and optimize physical networks. These networks, also known as ’Digital Twin Networks (DTNs)’ or ’Networks Digital Twins (NDTs),’ encompass many physical ne... Read More about AI-based traffic analysis in digital twin networks.

Barriers and enabling factors for error analysis in NLG research (2023)
Journal Article
Van Miltenburg, E., Clinciu, M., Dušek, O., Gkatzia, D., Inglis, S., Leppänen, L., Mahamood, S., Schoch, S., Thomson, C., & Wen, L. (2023). Barriers and enabling factors for error analysis in NLG research. Northern European Journal of Language Technology, 9(1), https://doi.org/10.3384/nejlt.2000-1533.2023.4529

Earlier research has shown that few studies in Natural Language Generation (NLG) evaluate their system outputs using an error analysis, despite known limitations of automatic evaluation metrics and human ratings. This position paper takes the stance... Read More about Barriers and enabling factors for error analysis in NLG research.

A Testing Methodology for the Internet of Things Affordable IP Cameras (2022)
Book Chapter
Dzwigala, G., Ghaleb, B., Aldhaheri, T. A., Wadhaj, I., Thomson, C., & Al-Zidi, N. M. (2022). A Testing Methodology for the Internet of Things Affordable IP Cameras. In H. Sharma, V. Shrivastava, K. Kumari Bharti, & L. Wang (Eds.), . Springer. https://doi.org/10.1007/978-981-19-2130-8_37

IP cameras are becoming a cheaper and more convenient option for a lot of households, whether it being for outdoor, indoor security, or as baby or pet monitors. Their security, however, is often lacking, and there is currently no testbed that focuses... Read More about A Testing Methodology for the Internet of Things Affordable IP Cameras.

Efficient algorithms for MAC layer duty cycling and frame delivery in wireless sensor network (2021)
Thesis
Thomson, C. J. Efficient algorithms for MAC layer duty cycling and frame delivery in wireless sensor network. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2850793

In Wireless Sensor Networks, with small, limited capacity devices now more prevalent, the issue of Neighbour Discovery has shifted. These devices utilise duty cycling methods in order to conserve battery power. Hence, the main issue is now that these... Read More about Efficient algorithms for MAC layer duty cycling and frame delivery in wireless sensor network.

A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node (2021)
Journal Article
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2021). A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node. Wireless Networks, 27(5), 3423-3439. https://doi.org/10.1007/s11276-021-02580-8

Utilising the mobilisation of a sink node in a wireless sensor network to combat the energy hole, or hotspot issue, is well referenced. However, another issue , that of energy spikes may remain. With the mobile sink node potentially communicating wit... Read More about A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node.

Towards an Energy Balancing Solution for Wireless Sensor Network with Mobile Sink Node (2021)
Journal Article
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2021). Towards an Energy Balancing Solution for Wireless Sensor Network with Mobile Sink Node. Computer Communications, 170, 50-64. https://doi.org/10.1016/j.comcom.2021.01.011

The issue of energy holes, or hotspots, in wireless sensor networks is well referenced. As is the proposed mobilisation of the sink node in order to combat this. However, as the mobile sink node may communicate with some nodes more than others, issue... Read More about Towards an Energy Balancing Solution for Wireless Sensor Network with Mobile Sink Node.

Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL) (2020)
Journal Article
Wadhaj, I., Ghaleb, B., Thomson, C., Al-Dubai, A., & Buchanen, B. (2020). Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL). IEEE Access, 8, 43665-43675. https://doi.org/10.1109/ACCESS.2020.2977476

Destination Advertisement Objects (DAOs) are sent upward by RPL nodes toward the DODAG root, to build the downward routing paths carrying traffic from the root to its associated nodes. This routing mechanism can be exploited by a malicious node perio... Read More about Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL).

Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network (2019)
Journal Article
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2019). Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network. Sensors, 19(22), Article 4930. https://doi.org/10.3390/s19224930

The hotspot issue in wireless sensor networks, with nodes nearest the sink node losing energy fastest and degrading network lifetime, is a well referenced problem. Mobile sink nodes have been proposed as a solution to this. This does not completely r... Read More about Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network.

Cooja Simulator Manual (2016)
Report
Thomson, C., Romdhani, I., Al-Dubai, A., Qasem, M., Ghaleb, B., & Wadhaj, I. (2016). Cooja Simulator Manual. Edinburgh: Edinburgh Napier University

While Cooja has been proven to be an ideal tool for the simulation of RPL in WSNs, there are challenges involved in its use, particularly in regard to a lack of documentation. The Contiki website provides an image of Instant Contiki which can then be... Read More about Cooja Simulator Manual.

DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof
Presentation / Conference Contribution
Kasimatis, D., Grierson, S., Buchanan, W. J., Eckl, C., Papadopoulos, P., Pitropakis, N., Chrysoulas, C., Thomson, C., & Ghaleb, B. (2024, September). DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof. Presented at 2024 IEEE International Conference on Cyber Security and Resilience (CSR), London, UK

Decentralised identifiers have become a standardised element of digital identity architecture, with supra-national organisations such as the European Union adopting them as a key component for a unified European digital identity ledger. This paper de... Read More about DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof.

AI in Energy Digital Twining: A Reinforcement Learning-Based Adaptive Digital Twin Model for Green Cities
Presentation / Conference Contribution
Cakir, V. L., Duran, K., Thomson, C., Broadbent, M., & Canberk, B. (2024, June). AI in Energy Digital Twining: A Reinforcement Learning-Based Adaptive Digital Twin Model for Green Cities. Presented at ICC 2024 - IEEE International Conference on Communications, Denver, CO, USA

Digital Twins (DT) have become crucial to achieve sustainable and effective smart urban solutions. However, current DT modelling techniques cannot support the dynamicity of these smart city environments. This is caused by the lack of right-time data... Read More about AI in Energy Digital Twining: A Reinforcement Learning-Based Adaptive Digital Twin Model for Green Cities.

A Comparative Study of VANET Routing Protocols for Safety Applications
Presentation / Conference Contribution
Coyle, K., Thomson, C., Wadhaj, I., & Ghaleb, B. (2023, November). A Comparative Study of VANET Routing Protocols for Safety Applications. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh

The rapid advancement of vehicular communication technologies has led to the emergence of Vehicular AdHoc Networks (VANETs), which hold immense potential for improving road safety and traffic efficiency. VANETs enable vehicles to communicate with eac... Read More about A Comparative Study of VANET Routing Protocols for Safety Applications.

Scalable Multi-domain Trust Infrastructures for Segmented Networks
Presentation / Conference Contribution
Grierson, S., Ghaleb, B., Buchanan, W. J., Thomson, C., Maglaras, L., & Eckl, C. (2023, November). Scalable Multi-domain Trust Infrastructures for Segmented Networks. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, UK

Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the au... Read More about Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems
Presentation / Conference Contribution
Grierson, S., Thomson, C., Papadopoulos, P., & Buchanan, B. (2021, December). Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems. Presented at 2021 14th International Conference on Security of Information and Networks (SIN), Edinburgh, United Kingdom

Intrusion detection systems are integral to the security of networked systems for detecting malicious or anomalous network traffic. As traditional approaches are becoming less effective, machine learning and deep learning-based intrusion detection sy... Read More about Min-max Training: Adversarially Robust Learning Models for Network Intrusion Detection Systems.

Wireless Sensor Networks (WSN) in Oil and Gas Industry: Applications, Requirements and Existing Solutions
Presentation / Conference Contribution
Wadhaj, I., Ghaleb, B., & Thomson, C. (2021, June). Wireless Sensor Networks (WSN) in Oil and Gas Industry: Applications, Requirements and Existing Solutions. Presented at International Conference on Emerging Technologies and Intelligent Systems (ICETIS 2021), Online

Effective measurement and monitoring of certain parameters (temperature, pressure, flow etc.) is crucial for the safety and optimization of processes in the Oil and Gas Industry. Wired sensors have been extensively utilized for this purpose but are c... Read More about Wireless Sensor Networks (WSN) in Oil and Gas Industry: Applications, Requirements and Existing Solutions.

An RPL based Optimal Sensors placement in Pipeline Monitoring WSNs
Presentation / Conference Contribution
Wadhaj, I., Thomson, C., & Ghaleb, B. (2021, June). An RPL based Optimal Sensors placement in Pipeline Monitoring WSNs. Presented at International Conference on Emerging Technologies and Intelligent Systems (ICETIS 2021), Online

Compared to an ordinary sensor network, Linear Sensor Networks (LSNs) has many applications in a number of areas such as surveillance and monitoring of international boundaries for illegal crossing, river environment monitoring and roads monitoring e... Read More about An RPL based Optimal Sensors placement in Pipeline Monitoring WSNs.

The Mobile Attacks Under Internet of Things Networks
Presentation / Conference Contribution
Kean, C., Ghaleb, B., Mcclelland, B., Ahmad, J., Wadhaj, I., & Thomson, C. (2022, September). The Mobile Attacks Under Internet of Things Networks. Presented at International Conference on Emerging Technologies and Intelligent Systems, Online

Since the introduction of the Routing Protocol for Low Power and Lossy Networks (RPL), its security aspects have been the focus of the scientific community who reported several security flaws that left the protocol vulnerable for several attacks. In... Read More about The Mobile Attacks Under Internet of Things Networks.

A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network
Presentation / Conference Contribution
Thomson, C., Wadhaj, I., Al-Dubai, A., & Tan, Z. (2020, April). A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network. Presented at IEEE 6th World Forum on Internet of Things, New Orleans, Louisiana, USA

The issue of energy holes, or hotspots, in wireless sensor networks is well referenced. As is the proposed mobilisa-tion of the sink node in order to combat this. However, as the sink node shall still pass some nodes more closely and frequently than... Read More about A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network.