• Authentication of underwater assets 

      Teglasy, Balint Zoltan; Wengle, Johan Emil Hugo; Potter, John Robert; Katsikas, Sokratis (Peer reviewed; Journal article, 2024)
      Secure digital wireless communication in the acoustic domain has become a key issue as underwater operations shift towards employing a heterogeneous mix of robotic assets and as the security of digital systems becomes ...
    • Dynamic setup of IPsec VPNs in service function chaining 

      Gunleifsen, Håkon; Kemmerich, Thomas; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      This article describes a novel mechanism for the automated establishment of dynamic Virtual Private Networks (VPN) in the application domain of Network Function Virtualization (NFV). Each hop in an NFV Service Function ...
    • Intent-driven autonomous network and service management in future cellular networks: A structured literature review 

      Mehmood, Kashif; Kralevska, Katina; Palma, David (Peer reviewed; Journal article, 2022)
      Intent-driven networks are an essential stepping stone in the evolution of network and service management towards a truly autonomous paradigm. User centric intents provide an abstracted means of impacting the design, ...
    • Joint head selection and airtime allocation for data dissemination in mobile social networks 

      Mao, Zhifei; Jiang, Yuming; Di, Xiaoqiang; Woldeyohannes, Yordanos Tibebu (Peer reviewed; Journal article, 2020)
      By forming a temporary group, users in mobile social networks (MSNs) can disseminate data to others in proximity with short-range communication technologies. However, due to user mobility, airtime available for users in ...
    • Local voting: A new distributed bandwidth reservation algorithm for 6TiSCH networks 

      Vergados, Dimitrios; Kralevska, Katina; Jiang, Yuming; Michalas, Angelos (Peer reviewed; Journal article, 2020)
      The IETF 6TiSCH working group fosters the adaptation of IPv6-based protocols into Internet of Things by introducing the 6TiSCH Operation Sublayer (6top). The 6TiSCH architecture integrates the high reliability and low-energy ...
    • Survivability analysis of a two-tier infrastructure-based wireless network 

      Xie, Lang; Heegaard, Poul Einar; Jiang, Yuming (Journal article, 2017)
      Network design and operation of a mobile network infrastructure, especially its base stations, need to consider survivability as a fundamental requirement. Quantifiable approaches to survivability analysis of such ...