scispace - formally typeset
Search or ask a question
Author

Rajiv Ramdhany

Bio: Rajiv Ramdhany is an academic researcher from Lancaster University. The author has contributed to research in topics: Routing protocol & Zone Routing Protocol. The author has an hindex of 8, co-authored 16 publications receiving 711 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The IoT experimentation facility described in this paper is conceived to provide a suitable platform for large scale experimentation and evaluation of IoT concepts under real-life conditions to influence the definition and specification of Future Internet architecture design.

622 citations

Journal ArticleDOI
TL;DR: A review of data exfiltration attack vectors and countermeasures revealed that most of the state of the art is focussed on preventive and detective countermeasures and significant research is required on developing investigative countermeasures that are equally important.

76 citations

Proceedings ArticleDOI
14 May 2016
TL;DR: This paper presents an approach to discover unknown knowns through multi-incident analysis based on a novel combination of grounded theory and incident fault trees and demonstrates the effectiveness of the approach through its application to identify revisions to a theoretical security model widely used in industry.
Abstract: Security is one of the biggest challenges facing organisations in the modern hyper-connected world. A number of theoretical security models are available that provide best practice security guidelines and are widely utilised as a basis to identify and operationalise security requirements. Such models often capture high-level security concepts (e.g., whitelisting, secure configurations, wireless access control, data recovery, etc.), strategies for operationalising such concepts through specific security controls, and relationships between the various concepts and controls. The threat landscape, however, evolves leading to new tacit knowledge that is embedded in or across a variety of security incidents. These unknown knowns alter, or at least demand reconsideration of the theoretical security models underpinning security requirements. In this paper, we present an approach to discover such unknown knowns through multi-incident analysis. The approach is based on a novel combination of grounded theory and incident fault trees. We demonstrate the effectiveness of the approach through its application to identify revisions to a theoretical security model widely used in industry.

27 citations

Proceedings ArticleDOI
17 Jun 2016
TL;DR: DVB-CSS is described, which is an open communication standard between Internet-connected TVs and companion screens, over the home network, and its development, use cases and early prototype implementation.
Abstract: This paper describes the development and implementation of an open communication standard between Internet-connected TVs and companion screens, over the home network. Content providers know that the better Internet connectivity and prevalence of personal mobile devices is encouraging our audiences to seek more interactive experiences across multiple screens. In order to deliver a coherent integrated user experience, with content on all screens presented according to a common timeline, the application on the companion device needs to discover what is being shown on the TV and what the timeline position is. DVB-CSS provides a standardised way to enable this synchronisation between the TV and any personal device on the home network. We describe its development, use cases and early prototype implementation.

25 citations

Book ChapterDOI
30 Nov 2009
TL;DR: In this article, the authors propose a framework for the simultaneous deployment of multiple ad-hoc routing protocols so that MANET nodes can switch protocols to optimise to current operating conditions, and also support finer-grained dynamic reconfiguration in terms of protocol variation and hybridization.
Abstract: The innate dynamicity and complexity of mobile ad-hoc networks (MANETs) has resulted in numerous ad-hoc routing protocols being proposed. Furthermore, numerous variants and hybrids continue to be reported in the literature. This diversity appears to be inherent to the field--it seems unlikely that there will ever be a 'one-size-fits-all' solution to the ad-hoc routing problem. However, typical deployment environments for ad-hoc routing protocols still force the choice of a single fixed protocol; and the resultant compromise can easily lead to sub-optimal performance, depending on current operating conditions. In this paper we address this problem by exploring a framework approach to the construction and deployment of ad-hoc routing protocols. Our framework supports the simultaneous deployment of multiple protocols so that MANET nodes can switch protocols to optimise to current operating conditions. The framework also supports finer-grained dynamic reconfiguration in terms of protocol variation and hybridisation. We evaluate our framework by using it to construct and (simultaneously) deploy two popular ad-hoc routing protocols (DYMO and OLSR), and also to derive fine-grained variants of these. We measure the performance and resource overhead of these implementations compared to monolithic ones, and find the comparison to be favourable to our approach.

20 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The design goals and the techniques, which different LPWA technologies exploit to offer wide-area coverage to low-power devices at the expense of low data rates are presented.
Abstract: Low power wide area (LPWA) networks are attracting a lot of attention primarily because of their ability to offer affordable connectivity to the low-power devices distributed over very large geographical areas. In realizing the vision of the Internet of Things, LPWA technologies complement and sometimes supersede the conventional cellular and short range wireless technologies in performance for various emerging smart city and machine-to-machine applications. This review paper presents the design goals and the techniques, which different LPWA technologies exploit to offer wide-area coverage to low-power devices at the expense of low data rates. We survey several emerging LPWA technologies and the standardization activities carried out by different standards development organizations (e.g., IEEE, IETF, 3GPP, ETSI) as well as the industrial consortia built around individual LPWA technologies (e.g., LoRa Alliance, Weightless-SIG, and Dash7 alliance). We further note that LPWA technologies adopt similar approaches, thus sharing similar limitations and challenges. This paper expands on these research challenges and identifies potential directions to address them. While the proprietary LPWA technologies are already hitting the market with large nationwide roll-outs, this paper encourages an active engagement of the research community in solving problems that will shape the connectivity of tens of billions of devices in the next decade.

1,362 citations

Journal ArticleDOI
TL;DR: In this paper, the authors propose a simulator, called iFogSim, to model IoT and fog environments and measure the impact of resource management techniques in latency, network congestion, energy consumption, and cost.
Abstract: Summary Internet of Things (IoT) aims to bring every object (eg, smart cameras, wearable, environmental sensors, home appliances, and vehicles) online, hence generating massive volume of data that can overwhelm storage systems and data analytics applications. Cloud computing offers services at the infrastructure level that can scale to IoT storage and processing requirements. However, there are applications such as health monitoring and emergency response that require low latency, and delay that is caused by transferring data to the cloud and then back to the application can seriously impact their performances. To overcome this limitation, Fog computing paradigm has been proposed, where cloud services are extended to the edge of the network to decrease the latency and network congestion. To realize the full potential of Fog and IoT paradigms for real-time analytics, several challenges need to be addressed. The first and most critical problem is designing resource management techniques that determine which modules of analytics applications are pushed to each edge device to minimize the latency and maximize the throughput. To this end, we need an evaluation platform that enables the quantification of performance of resource management policies on an IoT or Fog computing infrastructure in a repeatable manner. In this paper we propose a simulator, called iFogSim, to model IoT and Fog environments and measure the impact of resource management techniques in latency, network congestion, energy consumption, and cost. We describe two case studies to demonstrate modeling of an IoT environment and comparison of resource management policies. Moreover, scalability of the simulation toolkit of RAM consumption and execution time is verified under different circumstances.

1,085 citations

Journal ArticleDOI
TL;DR: This survey paper summarizes the current state-of-the-art of Internet of Things architectures in various domains systematically and proposes to solve real-life problems by building and deployment of powerful Internet of Nothing notions.

942 citations

Journal ArticleDOI
TL;DR: The paper presents a brief overview of smart cities, followed by the features and characteristics, generic architecture, composition, and real-world implementations ofSmart cities, and some challenges and opportunities identified through extensive literature survey on smart cities.

925 citations

Journal ArticleDOI
TL;DR: The IoT ecosystem is presented and how the combination of IoT and DA is enabling smart agriculture, and future trends and opportunities are provided which are categorized into technological innovations, application scenarios, business, and marketability.
Abstract: The surge in global population is compelling a shift toward smart agriculture practices. This coupled with the diminishing natural resources, limited availability of arable land, increase in unpredictable weather conditions makes food security a major concern for most countries. As a result, the use of Internet of Things (IoT) and data analytics (DA) are employed to enhance the operational efficiency and productivity in the agriculture sector. There is a paradigm shift from use of wireless sensor network (WSN) as a major driver of smart agriculture to the use of IoT and DA. The IoT integrates several existing technologies, such as WSN, radio frequency identification, cloud computing, middleware systems, and end-user applications. In this paper, several benefits and challenges of IoT have been identified. We present the IoT ecosystem and how the combination of IoT and DA is enabling smart agriculture. Furthermore, we provide future trends and opportunities which are categorized into technological innovations, application scenarios, business, and marketability.

814 citations