Rupak Kharel

Rupak Kharel
University of Huddersfield · School of Computing and Engineering

BEng, MSc, PhD, PGCE, SMIEEE, MIET, FHEA

About

109
Publications
55,133
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,173
Citations
Introduction
Prof. Kharel is Associate Dean and Professor of Cyber Security at University of Huddersfield.

Publications

Publications (109)
Article
Full-text available
Device-to-device communication in the Internet of Things (IoT) enables seamless data exchange, aiding automation, monitoring, and control. Yet, sustainability challenges arise due to energy-limited devices. This paper presents a novel method for Indoor IoT sensors to function without batteries. A broadband rectenna on low-cost FR4 substrate is prop...
Article
Full-text available
The traditional bundle relaying scheme rarely utilizes the impact of selfish nodes in Vehicular Delay Tolerant Networks (VDTNs) that may not be able to transmit messages to other nodes because of limited resources in the road transport system. Here the Railway Transport System (RTS) is used to transfer the data from one end to another end into the...
Article
Full-text available
DC-biased optical orthogonal frequency division multiplexing (DCO-OFDM) has been introduced to visible light networking framework for connected vehicles (LiNEV) systems as a modulation and multiplexing scheme. This is to overcome the light-emitting diode (LED) bandwidth limitation, as well as to reduce the inter-symbol interference caused by the mu...
Article
Federated learning (FL) is receiving much attention in the Healthcare Internet of Things (H-IoT) to support various instantaneous E-health services. Today, the deployment of FL suffers from several challenges, such as high training latency and data privacy leakage risks, especially for resource-constrained medical devices. In this paper, we develop...
Article
Drawing on the central themes of open innovation of the knowledge inflows and outflows for a firm’s innovative achievement, this research investigates the application of external knowledge (i.e. competitor intelligence) for product innovation. We posit that open-mindedness and inter-functional coordination mediate the relationship between competito...
Article
The internet of Drones (IoD) can encompass many essential services, including surveillance and emergency/rescue operations. While IoD is becomin popular and experiencing a rapid usage increase, privacy and security are the main concerns to avoid leakage of critical information and/or denial of services by a single drone or a whole IoD network. In a...
Article
Detection of outliers or anomalies is one of the vital issues in pattern-driven data mining. Outlier detection detects the inconsistent behavior of individual objects. It is an important sector in the data mining field with several different applications such as detecting credit card fraud, hacking discovery and discovering criminal activities. It...
Article
Full-text available
Background Enabling industrial environment with automation is growing trend due to the recent developments as industry 4.0 centric production. The industrial wireless sensor network environments have a number of constraints, including densely deployed nodes, delay constraint for mechanical operation, and access constraints due to node position with...
Article
Ambient temperature is closely related to human health. Maintaining a comfortable and stable temperature is crucial for the treatment, rehabilitation and daily e-health care of patients, where the Internet of Things has been widely applied for this purpose. However, the existing research always separates the network design from temperature monitori...
Preprint
Full-text available
Secure development is a proactive approach to cyber security. Rather than building a technological solution and then securing it in retrospect, secure development strives to embed good security practices throughout the development process and thereby reduces risk. Unfortunately, evidence suggests secure development is complex, costly, and limited i...
Article
Internet of drones (IoD) has gained significant importance in recent times due to its applications in several critical domains ranging from commercial to defense and rescue operations. With several drones flying in different zones to carry out specified tasks, the IoD can be beneficial to gather the real time data for interpretation by the users. H...
Article
Grouping problems are combinatorial optimization problems, most of them NP-hard, related to the partition of a set of items into different groups or clusters. Given their numerous real-world applications, different solution approaches have been presented to deal with the high complexity of NP-hard grouping problems. However, the Grouping Genetic Al...
Article
Full-text available
In this paper, we propose a non-localization routing protocol for underwater wireless sensor networks (UWSNs), namely, the triangle metric based multi-layered routing protocol (TM2RP). The main idea of the proposed TM2RP is to utilize supernodes along with depth information and residual energy to balance the energy consumption between sensors. More...
Article
Full-text available
To provide high-precision positioning for Internet of Things (IoT) scenarios, we optimize the indoor positioning technique based on Ultra-Wideband (UWB) Time Difference of Arrival (TDOA) equipment. This paper analyzes sources of positioning error and improves the time synchronization algorithm based on the synchronization packet. Then we use the la...
Conference Paper
Full-text available
In this study, we investigate the physical layer security (PLS) of a reconfigurable intelligent surface (RIS) enabled system over generalized fading channels. The RIS concept is becoming an essential technology for the achievement of smart radio environments, where large number of passive, miniature cells, are designed to influence incident signal....
Chapter
Full-text available
Parallel-machine scheduling problems are well-known NP-hard combinatorial optimization problems with many real-world applications. Given the increasing appearance of these problems, over the last few years, several algorithms have been developed to solve them, and different instances of these problems have been designed to be used as the benchmark...
Preprint
Full-text available
Grouping problems are combinatorial optimization problems, most of them NP-hard, related to the partition of a set of items into different groups or clusters. Given their numerous real-world applications, different solution approaches have been presented to deal with the high complexity of NP-hard grouping problems. However, the Grouping Genetic Al...
Article
This paper investigates the secrecy performance of an underlay cooperative cognitive relaying network, wherein a secondary source vehicle communicates with a fixed secondary destination terminal via a direct link and with the assistance of a secondary amplify-and-forward relay vehicle in the presence of a passive secondary eavesdropper vehicle, tak...
Article
Full-text available
The performance of the hybrid beamforming system based on the full-connected structure is close to that of the full-digital one in millimeter-wave (mmWave) massive multipleinput multiple-output (MIMO) systems. However, due to the high complexity of circuit wiring in practical applications, it has been greatly restricted. In this paper, we focus on...
Article
Full-text available
In this paper, the noncoherent detection scheme for the receiver in wireless sensor nodes is discussed. That is, an implementation-friendly and energy-efficient symbol-by-symbol detection scheme for IEEE 802.15.4 offset-quadrature phase shift keying (O-QPSK) receivers is investigated under both pure additive white Gaussian noise (AWGN) channel and...
Preprint
Over the last decade, cognitive radios (CRs) have emerged as a technology for improving spectrum efficiency through dynamic spectrum access techniques. More recently, as research interest is shifting beyond 5G communications, new technologies such as reconfigurable intelligent surfaces (RISs) have emerged as enablers of smart radio environments, to...
Article
Full-text available
The development of hybrid satellite-terrestrial relay networks (HSTRNs) is one of the driving forces for revolutionizing satellite communications in the modern era. Although there are many unique features of conventional satellite networks, their evolution pace is much slower than the terrestrial wireless networks. As a result, it is becoming more...
Article
Full-text available
Millimeter wave (mmWave) massive multiple-input multiple-output (MIMO) systems can obtain sufficient beamforming gains to combat severe path loss in signal propagation. The hybrid (analog/digital) beamforming with multiple data streams can be utilized to further improve mmWave spectral efficiency. In this paper, we focus on the hybrid beamforming d...
Article
Full-text available
The physical layer security (PLS) of wireless networks has witnessed significant attention in next generation communication systems due to its potential towards enabling protection at signal level in dense network environments. The growing trends towards smart mobility via sensor enabled vehicles is transforming today s traffic environment into Int...
Article
Full-text available
Aerial ad-hoc networks have the potential to enable smart services while maintaining communication between the ground system and unmanned aerial vehicles (UAV). Previous research has focused on enabling aerial data-centric smart services while integrating the benefits of aerial objects such as UAVs in hostile and non-hostile environments. Quality o...
Article
Full-text available
Abstract The energy harvesting methods enable WSNs nodes to last potentially forever with the help of energy harvesting subsystems for continuously providing energy, and storing it for future use. The energy harvesting techniques can use various potential sources of energy, such as solar, wind, mechanical, and variations in temperature. Energy-cons...
Preprint
Full-text available
This paper analyzes the performance of a cooperative relaying non-orthogonal multiple access (NOMA) network over Fisher-Snedecor F composite fading channels. Specifically, one base station (BS) is assumed to communicate with two receiving mobile users with one acting also as a decode-and-forward (DF) relay. To highlight the achievable performance g...
Preprint
Full-text available
This paper studies the physical layer security (PLS) of a vehicular network employing reconfigurable intelligent surfaces (RISs). RIS technologies are emerging as an important paradigm for the realisation of next-generation smart radio environments, where large numbers of small, low-cost and passive elements, reflect the incident signal with an adj...
Article
Full-text available
Perfect channel state information (CSI) is required in most of the classical physical layer security techniques, while it is difficult to obtain the ideal CSI due to the time varying wireless fading channel. Although imperfect CSI has a greatly impact on the security of MIMO communications, deep learning is becoming a promising solution to handle t...
Article
Full-text available
Underwater sensor networks (UWSNs) have witnessed significant R&D attention in both academia and industry due to their growing application domains, such as border security, freight via sea or river, natural petroleum production and the fishing industry. Considering the deep underwater-oriented access constraints, energy-centric communication for th...
Article
Full-text available
In this paper, we investigate the reliability and security of cooperative dual-hop nonorthogonal multiple access (NOMA) for internet-of-thing (IoT) networks, in which the transceivers consider a detrimental factor of in-phase and quadrature-phase imbalance (IQI). The communication between the source and destination is accomplished through a decode-...
Article
Full-text available
Non-orthogonal multiple access (NOMA) system can meet the demands of ultra-high data rate, ultra-low latency, ultra-high reliability and massive connectivity of user devices (UE). However, the performance of the NOMA system may be deteriorated by the hardware impairments. In this paper, the joint effects of in-phase and quadrature-phase imbalance (...
Article
Full-text available
Non-orthogonal multiple access (NOMA) system can meet the demands of ultra-high data rate, ultra-low latency, ultra-high reliability and large-scale connectivity of user devices. However, the performance of the NOMA system may be deteriorated by the hardware impairments. In this paper, the joint effects of in-phase and quadrature-phase imbalance (I...
Conference Paper
Full-text available
This paper studies the physical layer security (PLS) of a vehicular network employing a reconfigurable intelligent surface (RIS). RIS technologies are emerging as an important paradigm for the realisation of smart radio environments, where large numbers of small, low-cost and passive elements, reflect the incident signal with an adjustable phase sh...
Article
Full-text available
In this paper, we propose a unified framework for hybrid satellite/unmanned aerial vehicle (HS-UAV) terrestrial non-orthogonal multiple access (NOMA) networks, where satellite aims to communicate with ground users with the aid of a decode-forward (DF) UAV relay by using NOMA protocol. All users are randomly deployed to follow a homogeneous Poisson...
Article
Full-text available
Minimizing energy consumption is one of the major challenges in wireless sensor networks (WSNs) due to the limited size of batteries and the resource constrained tiny sensor nodes. Energy harvesting in wireless sensor networks (EH-WSNs) is one of the promising solutions to minimize the energy consumption in wireless sensor networks for prolonging t...
Preprint
Full-text available
This paper studies the physical layer security (PLS) of a vehicular network employing a reconfigurable intelligent surface (RIS). RIS technologies are emerging as an important paradigm for the realisation of smart radio environments, where large numbers of small, low-cost and passive elements, reflect the incident signal with an adjustable phase sh...
Preprint
Full-text available
This paper studies an Internet-of-Things (IoT) network employing a reconfigurable intelligent surface (RIS) over generalized fading channels. Inspired by the promising potential of RIS-based transmission, we investigate a RIS-enabled IoT network with the source node employing a RIS-based access point. The system is modelled with reference to a rece...
Conference Paper
This paper studies the physical layer security of a vehicular communication network in the presence of interference constraints by analysing its secrecy capacity. The system considers a legitimate receiver node and an eavesdropper node, within a shared network, both under the effect of interference from other users. The double-Rayleigh fading chann...
Preprint
Full-text available
This paper studies the physical layer security of a vehicular communication network in the presence of interference constraints by analysing its secrecy capacity. The system considers a legitimate receiver node and an eavesdropper node, within a shared network, both under the effect of interference from other users. The double-Rayleigh fading chann...
Article
Full-text available
This paper investigates the reliability and security performance of the downlink non-orthogonal multiple access (NOMA) networks over Nakagami-m fading channels, where the base station (BS) aims to communicate with multi-antenna NOMA users in the presence of a multi-antenna eavesdropper. To be more practical, a detrimental factor at both transmitter...
Article
Full-text available
In this paper, we investigate the effects of residual hardware impairments (RHIs), channels estimation errors (CEEs) and imperfect successive interference cancellation (ipSIC) on the cooperative NOMA system over Nakagami-m channels, where the amplify-and-forward (AF) relay can harvest energy from the source. The exact expressions for outage probabi...
Article
Full-text available
Due to the rapidly growing sensor-enabled connected world around us, with the continuously decreasing size of sensors from smaller to tiny, energy efficiency in wireless sensor networks has drawn ample consideration in both academia as well as in industries' R&D. The literature of energy efficiency in wireless sensor networks (WSNs) is focused on t...
Article
Full-text available
Energy is a precious resource in the sensors-enabled Internet of Things (IoT). Unequal load on sensors deplete their energy quickly, which may interrupt the operations in the network. Further, a single artificial intelligence technique is not enough to solve the problem of load balancing and minimize energy consumption, because of the integration o...
Chapter
Internet of things (IoT) is considered to revolutionize the way internet works and bring together the concepts such as machine to machine (M2M) communication, big data, artificial intelligence, etc. to work under a same umbrella such that cyber space and human (physical systems) are more intertwined and thus ubiquitous giving rise to cyber physical...
Article
Full-text available
In multi-hop wireless communication, a sensor node should consume its energy efficiently for relaying of data packets. However, most of the IoT-devices are equipped with limited battery power and computing resources for wireless communications thus energy optimization becomes one of the major concerns in wireless sensors routing design. The wireles...
Article
Full-text available
Cloud computing provides platform for pay per use services such as software, hardware and platforms. Previous cloud frameworks use fix policies that do not have the functionality to upgrade services on demand when the user do not receive services according to Service Level Agreement (SLA). Also, there was a lack of functionality to monitor external...
Article
Full-text available
Geocasting in vehicular communication has witnessed significant attention due to the benefits of location oriented information dissemination in vehicular traffic environments. Various measures have been applied to enhance geocasting performance including dynamic relay area selection, junction nodes incorporation, caching integration, and geospatial...
Article
Full-text available
Recent technological advancement in wireless communication has led to the invention of wireless body area networks (WBANs), a cutting-edge technology in healthcare applications. WBANs interconnect with intelligent and miniaturized biomedical sensor nodes placed on human body to an unattended monitoring of physiological parameters of the patient. Th...
Article
Recent technological advancement in wireless communication has led to the invention of wireless body area networks (WBANs), a cutting-edge technology in healthcare applications. WBANs interconnect with intelligent and miniaturized biomedical sensor nodes placed on human body to an unattended monitoring of physiological parameters of the patient. Th...
Chapter
Full-text available
This paper analyses the results from an experimental study on the performance of the heterogeneous wireless networks based on IEEE 802.11a, 802.11n and 802.11ac standards in an indoor environment considering the key features of PHY layers mainly, Multiple Input Multiple Output (MIMO), Multi-User Multiple Input Multiple Output (MU-MIMO), Channel Bon...
Chapter
Internet of Things (IoT) is becoming more and more pervasive in everyday life and connecting an array of diverse physical objects. It is fast growing and receiving a tremendous amount of research focus. Billions of objects communicate each other with or without human intervention to achieve smart applications. Most of the connected devices are cons...
Article
Full-text available
The multipath transmission is one of the suitable transmission methods for high data rate oriented communication such as video streaming. Each video packets are split into smaller frames for parallel transmission via different paths. One path may interfere with another path due to these parallel transmissions. The multipath oriented interference is...
Conference Paper
Full-text available
Recently, Internet of Things (IoT) have witnessed significant attention due to their potential of bringing massive number of interconnected heterogeneous sensor nodes to collect big data for harnessing knowledge thus enabling real time monitoring and control. These wireless sensors relay their packets on to the base station via multi-hop transmissi...
Conference Paper
Full-text available
Internet of things (IoT) is considered to revolutionize the way internet works and bring together the concepts such as machine to machine (M2M) communication, big data, artificial intelligence, etc. to work under a same umbrella such that cyber space and human (physical systems) are more intertwined and thus ubiquitous giving rise to cyber physical...
Conference Paper
Full-text available
Due to the scarce energy supplies of the internet of things (IoT) devices, it is necessary to design the architecture and operation of the network to optimize the power usage. Scheduling algorithm is an essential part of WSNs and IoT networks. Such algorithms allow to classify the queues and decide which process to run. Therefore, scheduling messag...
Article
Full-text available
Virtualization technology has revolutionized the mobile network and widely used in fifth‐generation innovation. It is a way of computing that allows dynamic leasing of server capabilities in the form of services like Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). The proliferation of these servic...
Conference Paper
Full-text available
Abstract—Due to the scarce energy supplies of the internet of things (IoT) devices, it is necessary to design the architecture and operation of the network to optimize the power usage. Scheduling algorithm is an essential part of WSNs and IoT networks. Such algorithms allow to classify the queues and decide which process to run. Therefore, scheduli...
Article
Full-text available
Vehicular localization has witnessed significant attention due to the growing number of location-based services in vehicular cyber physical systems (VCPS). In vehicular localization, GPS outage is a challenging issue considering the growing urbanization including high rise buildings, multi-level flyovers and bridges. GPS-free and GPS-assisted coope...
Article
Full-text available
Location-oriented services in Vehicular CyberPhysical System (VCPS) have witnessed significant attention due to their potentiality to address traffic safety and efficiency related issues. The multichannel communication aids these services by tuning their overall performance in vehicular environments. Related literature on multichannel communication...
Article
Recently, energy efficiency in sensor enabled wireless network domain has witnessed significant attention from both academia and industries. It is an enabling technological advancement towards green computing in Internet of things (IoT) eventually supporting sensor generated big data processing for smart cities. Related literature on energy efficie...
Conference Paper
Full-text available
Internet of Things (IoT) is a rapidly growing technology with a wide range of applications in various fields. It has unified a plethora of devices and infrastructure under the same umbrella and is considered by many technologies leaders as the network of the future (NoF). IoT connects heterogeneous devices that provide sensing, control, actuation,...
Conference Paper
Full-text available
Internet of Things (IoT) is becoming more and more pervasive in everyday life and connecting an array of diverse physical objects. It is fast growing and receiving a tremendous amount of research focus. Billions of objects communicate each other with or without human intervention to achieve smart applications. Most of the connected devices are cons...
Article
Full-text available
Mid-range resonant coupling-based high efficient wireless power transfer (WPT) techniques have gained substantial research interest due to the number of potential applications in many industries. This paper presents a novel design of a resonant two-loop WPT technique including the design, fabrication and preliminary results of this proposal. This n...
Conference Paper
Full-text available
Whilst the concept of IoT has already started to expand to some industrial environments, one industrial environment which still has not much exposure is the plastics industry environment made up of the Injection Moulding (IM), Micro Injection Moulding (μIM) and Extrusion line manufacturing processes. These processes would directly benefit from the...
Article
Full-text available
This paper proposes a hybrid circuit between a conformal strongly-coupled magnetic resonance (CSCMR) and a strongly-coupled magnetic resonance (SCMR), for better wireless power transmission (WPT). This combination promises to enhance the flexibility of the proposed four-loop WPT system. The maximum efficiency at various distances is achieved by com...
Article
The traditional macro-only network is not effective, especially when communication signal is required for users far away from the macrocell base station and located in the cell edge. The signal strength reaching these users is excessively attenuated due to fading and shadowing. The deployment of femtocells around the cell edge of this macrocell hel...
Article
Full-text available
In this paper, we consider the problem of feedback stabilization of discrete-time systems with delays. The systems under consideration are nonlinear and nonaffine. By using the Lyapunov Razumikhin approach, we deduce general conditions for stabilizing the closed-loop system. Moreover stabilizing state feedback control laws are proposed.
Article
Full-text available
This work is concerned with the design of a chaotic communication system based on a modified inclusion method. For this, we propose a bidirectional transmitter-receiver communication scheme whereby the transmitter is a Rossler oscillator and the receiver is a corresponding nonlinear high gain observer. The main motivation to employ a bidirectional...
Article
Full-text available
This work proposes a chaotic cryptographic system based on a modified inclusion method in combination with indirect coupled synchronisation to create a chaotic private key. A Rossler type chaotic oscillator is used to embed an encrypted message in its dynamics as well as to drive the piece-wise linear function of a Chua type system, used to create...
Article
The spacecraft payload operational time (SPOT) is amongst the main critical design considerations that must be optimised and validated during the system engineering analysis of a spacecraft mission. This requirement becomes more demanding for a communication satellite mission that relies on the functionality of the payload for its operation and ser...
Conference Paper
In this paper, an observer-based secure communication system composed of four chaotic oscillators is proposed. Observer based synchronization is achieved between two of these oscillators and employed as a transmitter and a receiver. The other two oscillators are indirectly coupled and are employed as keystream generators. The novelty lies in the ge...
Conference Paper
In this work, the synchronization of two indirectly coupled discrete-time chaotic systems is first demonstrated. Next, the result is then applied for presenting a secure communication system. The novelty of the proposed method lies on the generation of encryption key stream for discrete-time chaotic systems using indirect coupled synchronization. S...
Conference Paper
In this paper, a new a secure communication scheme using chaotic signal for transmitting binary digital signals is proposed and which is then implemented on a Digital Signal Processor (DSP) board. The method uses the idea of indirect coupled synchronization for generating the same keystream in the transmitter and receiver side. This chaotic keystre...
Article
In this paper, a modified chaotic shift keying method is proposed to transmit digital bits securely over a communication channel. The scheme is based upon encrypting the digital bits 0 and 1 into infinite levels by applying the keystream such that there is no recognisable pattern in the encoded transmitted signal. The encoded transmitting signal ge...

Questions

Questions (3)
Question
We are looking for a self-motivated research focused candidate for an 18 month Post-Doctoral Research Associate (PDRA) position at the School of Engineering, Manchester Metropolitan University.
The primary responsibility of the PDRA is to develop innovative solutions for emerging research problems in the broad area of wireless communication systems and signal processing. It is expected that you will work on areas such as low-power wireless communication for cyber-physical systems, Internet of Things, 5G or physical layer security.
Apply for the job here at
For an informal discussion, please contact Dr Rupak Kharel (r.kharel@mmu.ac.uk)
Please share this within your network who might be interested on it.

Network

Cited By