![Rupak Kharel](https://i1.rgstatic.net/ii/profile.image/949756536844288-1603451012541_Q128/Rupak-Kharel.jpg)
Rupak KharelUniversity of Huddersfield · School of Computing and Engineering
Rupak Kharel
BEng, MSc, PhD, PGCE, SMIEEE, MIET, FHEA
About
109
Publications
55,133
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,173
Citations
Introduction
Prof. Kharel is Associate Dean and Professor of Cyber Security at University of Huddersfield.
Skills and Expertise
Publications
Publications (109)
Device-to-device communication in the Internet of Things (IoT) enables seamless data exchange, aiding automation, monitoring, and control. Yet, sustainability challenges arise due to energy-limited devices. This paper presents a novel method for Indoor IoT sensors to function without batteries. A broadband rectenna on low-cost FR4 substrate is prop...
The traditional bundle relaying scheme rarely utilizes the impact of selfish nodes in Vehicular Delay Tolerant Networks (VDTNs) that may not be able to transmit messages to other nodes because of limited resources in the road transport system. Here the Railway Transport System (RTS) is used to transfer the data from one end to another end into the...
DC-biased optical orthogonal frequency division multiplexing (DCO-OFDM) has been introduced to visible light networking framework for connected vehicles (LiNEV) systems as a modulation and multiplexing scheme. This is to overcome the light-emitting diode (LED) bandwidth limitation, as well as to reduce the inter-symbol interference caused by the mu...
Federated learning (FL) is receiving much attention in the Healthcare Internet of Things (H-IoT) to support various instantaneous E-health services. Today, the deployment of FL suffers from several challenges, such as high training latency and data privacy leakage risks, especially for resource-constrained medical devices. In this paper, we develop...
Drawing on the central themes of open innovation of the knowledge inflows and outflows for a firm’s innovative achievement, this research investigates the application of external knowledge (i.e. competitor intelligence) for product innovation. We posit that open-mindedness and inter-functional coordination mediate the relationship between competito...
The internet of Drones (IoD) can encompass many essential services, including surveillance and emergency/rescue operations. While IoD is becomin popular and experiencing a rapid usage increase, privacy and security are the main concerns to avoid leakage of critical information and/or denial of services by a single drone or a whole IoD network. In a...
Detection of outliers or anomalies is one of the vital issues in pattern-driven data mining. Outlier detection detects the inconsistent behavior of individual objects. It is an important sector in the data mining field with several different applications such as detecting credit card fraud, hacking discovery and discovering criminal activities. It...
Background
Enabling industrial environment with automation is growing trend due to the recent developments as industry 4.0 centric production. The industrial wireless sensor network environments have a number of constraints, including densely deployed nodes, delay constraint for mechanical operation, and access constraints due to node position with...
Ambient temperature is closely related to human health. Maintaining a comfortable and stable temperature is crucial for the treatment, rehabilitation and daily e-health care of patients, where the Internet of Things has been widely applied for this purpose. However, the existing research always separates the network design from temperature monitori...
Secure development is a proactive approach to cyber security. Rather than building a technological solution and then securing it in retrospect, secure development strives to embed good security practices throughout the development process and thereby reduces risk. Unfortunately, evidence suggests secure development is complex, costly, and limited i...
Internet of drones (IoD) has gained significant importance in recent times due to its applications in several critical domains ranging from commercial to defense and rescue operations. With several drones flying in different zones to carry out specified tasks, the IoD can be beneficial to gather the real time data for interpretation by the users. H...
Grouping problems are combinatorial optimization problems, most of them NP-hard, related to the partition of a set of items into different groups or clusters. Given their numerous real-world applications, different solution approaches have been presented to deal with the high complexity of NP-hard grouping problems. However, the Grouping Genetic Al...
The authors wish to make the following erratum to this paper [...]
In this paper, we propose a non-localization routing protocol for underwater wireless sensor networks (UWSNs), namely, the triangle metric based multi-layered routing protocol (TM2RP). The main idea of the proposed TM2RP is to utilize supernodes along with depth information and residual energy to balance the energy consumption between sensors. More...
To provide high-precision positioning for Internet of Things (IoT) scenarios, we optimize the indoor positioning technique based on Ultra-Wideband (UWB) Time Difference of Arrival (TDOA) equipment. This paper analyzes sources of positioning error and improves the time synchronization algorithm based on the synchronization packet. Then we use the la...
In this study, we investigate the physical layer security (PLS) of a reconfigurable intelligent surface (RIS) enabled system over generalized fading channels. The RIS concept is becoming an essential technology for the achievement of smart radio environments, where large number of passive, miniature cells, are designed to influence incident signal....
Parallel-machine scheduling problems are well-known NP-hard combinatorial optimization problems with many real-world applications. Given the increasing appearance of these problems, over the last few years, several algorithms have been developed to solve them, and different instances of these problems have been designed to be used as the benchmark...
Grouping problems are combinatorial optimization problems, most of them NP-hard, related to the partition of a set of items into different groups or clusters. Given their numerous real-world applications, different solution approaches have been presented to deal with the high complexity of NP-hard grouping problems. However, the Grouping Genetic Al...
This paper investigates the secrecy performance of
an underlay cooperative cognitive relaying network, wherein a
secondary source vehicle communicates with a fixed secondary
destination terminal via a direct link and with the assistance of a
secondary amplify-and-forward relay vehicle in the presence of a
passive secondary eavesdropper vehicle, tak...
The performance of the hybrid beamforming system based on the full-connected structure is close to that of the full-digital one in millimeter-wave (mmWave) massive multipleinput multiple-output (MIMO) systems. However, due to the high complexity of circuit wiring in practical applications, it has been greatly restricted. In this paper, we focus on...
In this paper, the noncoherent detection scheme for the receiver in wireless sensor nodes is discussed. That is, an implementation-friendly and energy-efficient symbol-by-symbol detection scheme for IEEE 802.15.4 offset-quadrature phase shift keying (O-QPSK) receivers is investigated under both pure additive white Gaussian noise (AWGN) channel and...
Over the last decade, cognitive radios (CRs) have emerged as a technology for improving spectrum efficiency through dynamic spectrum access techniques. More recently, as research interest is shifting beyond 5G communications, new technologies such as reconfigurable intelligent surfaces (RISs) have emerged as enablers of smart radio environments, to...
The development of hybrid satellite-terrestrial relay networks (HSTRNs) is one of the driving forces for revolutionizing satellite communications in the modern era. Although there are many unique features of conventional satellite networks, their evolution pace is much slower than the terrestrial wireless networks. As a result, it is becoming more...
Millimeter wave (mmWave) massive multiple-input multiple-output (MIMO) systems can obtain sufficient beamforming gains to combat severe path loss in signal propagation. The hybrid (analog/digital) beamforming with multiple data streams can be utilized to further improve mmWave spectral efficiency. In this paper, we focus on the hybrid beamforming d...
The physical layer security (PLS) of wireless networks has witnessed significant attention in next generation communication systems due to its potential towards enabling protection at signal level in dense network environments. The growing trends towards smart mobility via sensor enabled vehicles is transforming today s traffic environment into Int...
Aerial ad-hoc networks have the potential to enable smart services while maintaining communication between the ground system and unmanned aerial vehicles (UAV). Previous research has focused on enabling aerial data-centric smart services while integrating the benefits of aerial objects such as UAVs in hostile and non-hostile environments. Quality o...
Abstract The energy harvesting methods enable WSNs nodes to last potentially forever with the help of energy harvesting subsystems for continuously providing energy, and storing it for future use. The energy harvesting techniques can use various potential sources of energy, such as solar, wind, mechanical, and variations in temperature. Energy-cons...
This paper analyzes the performance of a cooperative relaying non-orthogonal multiple access (NOMA) network over Fisher-Snedecor F composite fading channels. Specifically, one base station (BS) is assumed to communicate with two receiving mobile users with one acting also as a decode-and-forward (DF) relay. To highlight the achievable performance g...
This paper studies the physical layer security (PLS) of a vehicular network employing reconfigurable intelligent surfaces (RISs). RIS technologies are emerging as an important paradigm for the realisation of next-generation smart radio environments, where large numbers of small, low-cost and passive elements, reflect the incident signal with an adj...
Perfect channel state information (CSI) is required in most of the classical physical layer security techniques, while it is difficult to obtain the ideal CSI due to the time varying wireless fading channel. Although imperfect CSI has a greatly impact on the security of MIMO communications, deep learning is becoming a promising solution to handle t...
Underwater sensor networks (UWSNs) have witnessed significant R&D attention in both academia and industry due to their growing application domains, such as border security, freight via sea or river, natural petroleum production and the fishing industry. Considering the deep underwater-oriented access constraints, energy-centric communication for th...
In this paper, we investigate the reliability and security of cooperative dual-hop nonorthogonal multiple access (NOMA) for internet-of-thing (IoT) networks, in which the transceivers consider a detrimental factor of in-phase and quadrature-phase imbalance (IQI). The communication between the source and destination is accomplished through a decode-...
Non-orthogonal multiple access (NOMA) system can meet the demands of ultra-high data rate, ultra-low latency, ultra-high reliability and massive connectivity of user devices (UE). However, the performance of the NOMA system may be deteriorated by the hardware impairments. In this paper, the joint effects of in-phase and quadrature-phase imbalance (...
Non-orthogonal multiple access (NOMA) system can meet the demands of ultra-high data rate, ultra-low latency, ultra-high reliability and large-scale connectivity of user devices. However, the performance of the NOMA system may be deteriorated by the hardware impairments. In this paper, the joint effects of in-phase and quadrature-phase imbalance (I...
This paper studies the physical layer security (PLS)
of a vehicular network employing a reconfigurable intelligent
surface (RIS). RIS technologies are emerging as an important
paradigm for the realisation of smart radio environments, where
large numbers of small, low-cost and passive elements, reflect the
incident signal with an adjustable phase sh...
In this paper, we propose a unified framework for hybrid satellite/unmanned aerial vehicle (HS-UAV) terrestrial non-orthogonal multiple access (NOMA) networks, where satellite aims to communicate with ground users with the aid of a decode-forward (DF) UAV relay by using NOMA protocol. All users are randomly deployed to follow a homogeneous Poisson...
Minimizing energy consumption is one of the major challenges in wireless sensor networks (WSNs) due to the limited size of batteries and the resource constrained tiny sensor nodes. Energy harvesting in wireless sensor networks (EH-WSNs) is one of the promising solutions to minimize the energy consumption in wireless sensor networks for prolonging t...
This paper studies the physical layer security (PLS) of a vehicular network employing a reconfigurable intelligent surface (RIS). RIS technologies are emerging as an important paradigm for the realisation of smart radio environments, where large numbers of small, low-cost and passive elements, reflect the incident signal with an adjustable phase sh...
This paper studies an Internet-of-Things (IoT) network employing a reconfigurable intelligent surface (RIS) over generalized fading channels. Inspired by the promising potential of RIS-based transmission, we investigate a RIS-enabled IoT network with the source node employing a RIS-based access point. The system is modelled with reference to a rece...
This paper studies the physical layer security of a vehicular communication network in the presence of interference constraints by analysing its secrecy capacity. The system considers a legitimate receiver node and an eavesdropper node, within a shared network, both under the effect of interference from other users. The double-Rayleigh fading chann...
This paper studies the physical layer security of a vehicular communication network in the presence of interference constraints by analysing its secrecy capacity. The system considers a legitimate receiver node and an eavesdropper node, within a shared network, both under the effect of interference from other users. The double-Rayleigh fading chann...
This paper investigates the reliability and security performance of the downlink non-orthogonal multiple access (NOMA) networks over Nakagami-m fading channels, where the base station (BS) aims to communicate with multi-antenna NOMA users in the presence of a multi-antenna eavesdropper. To be more practical, a detrimental factor at both transmitter...
In this paper, we investigate the effects of residual hardware impairments (RHIs), channels estimation errors (CEEs) and imperfect successive interference cancellation (ipSIC) on the cooperative NOMA system over Nakagami-m channels, where the amplify-and-forward (AF) relay can harvest energy from the source. The exact expressions for outage probabi...
Due to the rapidly growing sensor-enabled connected world around us, with the continuously decreasing size of sensors from smaller to tiny, energy efficiency in wireless sensor networks has drawn ample consideration in both academia as well as in industries' R&D. The literature of energy efficiency in wireless sensor networks (WSNs) is focused on t...
Energy is a precious resource in the sensors-enabled Internet of Things (IoT). Unequal load on sensors deplete their energy quickly, which may interrupt the operations in the network. Further, a single artificial intelligence technique is not enough to solve the problem of load balancing and minimize energy consumption, because of the integration o...
Internet of things (IoT) is considered to revolutionize the way internet works and bring together the concepts such as machine to machine (M2M) communication, big data, artificial intelligence, etc. to work under a same umbrella such that cyber space and human (physical systems) are more intertwined and thus ubiquitous giving rise to cyber physical...
In multi-hop wireless communication, a sensor node should consume its energy efficiently for relaying of data packets. However, most of the IoT-devices are equipped with limited battery power and computing resources for wireless communications thus energy optimization becomes one of the major concerns in wireless sensors routing design. The wireles...
Cloud computing provides platform for pay per use services such as software, hardware and platforms. Previous cloud frameworks use fix policies that do not have the functionality to upgrade services on demand when the user do not receive services according to Service Level Agreement (SLA). Also, there was a lack of functionality to monitor external...
Geocasting in vehicular communication has witnessed significant attention due to the benefits of location oriented information dissemination in vehicular traffic environments. Various measures have been applied to enhance geocasting performance including dynamic relay area selection, junction nodes incorporation, caching integration, and geospatial...
Recent technological advancement in wireless communication has led to the invention of wireless body area networks (WBANs), a cutting-edge technology in healthcare applications. WBANs interconnect with intelligent and miniaturized biomedical sensor nodes placed on human body to an unattended monitoring of physiological parameters of the patient. Th...
Recent technological advancement in wireless communication has led to the invention of wireless body area networks (WBANs), a cutting-edge technology in healthcare applications. WBANs interconnect with intelligent and miniaturized biomedical sensor nodes placed on human body to an unattended monitoring of physiological parameters of the patient. Th...
This paper analyses the results from an experimental study on the performance of the heterogeneous wireless networks based on IEEE 802.11a, 802.11n and 802.11ac standards in an indoor environment considering the key features of PHY layers mainly, Multiple Input Multiple Output (MIMO), Multi-User Multiple Input Multiple Output (MU-MIMO), Channel Bon...
Internet of Things (IoT) is becoming more and more pervasive in everyday life and connecting an array of diverse physical objects. It is fast growing and receiving a tremendous amount of research focus. Billions of objects communicate each other with or without human intervention to achieve smart applications. Most of the connected devices are cons...
The multipath transmission is one of the suitable transmission methods for high data rate oriented communication such as video streaming. Each video packets are split into smaller frames for parallel transmission via different paths. One path may interfere with another path due to these parallel transmissions. The multipath oriented interference is...
Recently, Internet of Things (IoT) have witnessed significant attention due to their potential of bringing massive number of interconnected heterogeneous sensor nodes to collect big data for harnessing knowledge thus enabling real time monitoring and control. These wireless sensors relay their packets on to the base station via multi-hop transmissi...
Internet of things (IoT) is considered to revolutionize the way internet works and bring together the concepts such as machine to machine (M2M) communication, big data, artificial intelligence, etc. to work under a same umbrella such that cyber space and human (physical systems) are more intertwined and thus ubiquitous giving rise to cyber physical...
Due to the scarce energy supplies of the internet of things (IoT) devices, it is necessary to design the architecture and operation of the network to optimize the power usage. Scheduling algorithm is an essential part of WSNs and IoT networks. Such algorithms allow to classify the queues and decide which process to run. Therefore, scheduling messag...
Virtualization technology has revolutionized the mobile network and widely used in fifth‐generation innovation. It is a way of computing that allows dynamic leasing of server capabilities in the form of services like Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). The proliferation of these servic...
Abstract—Due to the scarce energy supplies of the internet of
things (IoT) devices, it is necessary to design the architecture
and operation of the network to optimize the power usage.
Scheduling algorithm is an essential part of WSNs and IoT
networks. Such algorithms allow to classify the queues and decide
which process to run. Therefore, scheduli...
Vehicular localization has witnessed significant attention due to the growing number of location-based services in vehicular cyber physical systems (VCPS). In vehicular localization, GPS outage is a challenging issue considering the growing urbanization including high rise buildings, multi-level flyovers and bridges. GPS-free and GPS-assisted coope...
Location-oriented services in Vehicular CyberPhysical System (VCPS) have witnessed significant attention due to their potentiality to address traffic safety and efficiency related issues. The multichannel communication aids these services by tuning their overall performance in vehicular environments. Related literature on multichannel communication...
Recently, energy efficiency in sensor enabled wireless network domain has witnessed significant attention from both academia and industries. It is an enabling technological advancement towards green computing in Internet of things (IoT) eventually supporting sensor generated big data processing for smart cities. Related literature on energy efficie...
Internet of Things (IoT) is a rapidly growing technology with a wide range of applications in various fields. It has unified a plethora of devices and infrastructure under the same umbrella and is considered by many technologies leaders as the network of the future (NoF). IoT connects heterogeneous devices that provide sensing, control, actuation,...
Internet of Things (IoT) is becoming more and more pervasive in everyday life and connecting an array of diverse physical objects. It is fast growing and receiving a tremendous amount of research focus. Billions of objects communicate each other with or without human intervention to achieve smart applications. Most of the connected devices are cons...
Mid-range resonant coupling-based high efficient wireless power transfer (WPT) techniques have gained substantial research interest due to the number of potential applications in many industries. This paper presents a novel design of a resonant two-loop WPT technique including the design, fabrication and preliminary results of this proposal. This n...
Whilst the concept of IoT has already started to expand to some industrial environments, one industrial environment which still has not much exposure is the plastics industry environment made up of the Injection Moulding (IM), Micro Injection Moulding (μIM) and Extrusion line manufacturing processes. These processes would directly benefit from the...
This paper proposes a hybrid circuit between a conformal strongly-coupled magnetic
resonance (CSCMR) and a strongly-coupled magnetic resonance (SCMR), for better wireless
power transmission (WPT). This combination promises to enhance the flexibility of the proposed
four-loop WPT system. The maximum efficiency at various distances is achieved by com...
The traditional macro-only network is not effective, especially when communication signal is required for users far away from the macrocell base station and located in the cell edge. The signal strength reaching these users is excessively attenuated due to fading and shadowing. The deployment of femtocells around the cell edge of this macrocell hel...
In this paper, we consider the problem of feedback stabilization of discrete-time systems with delays. The systems under consideration are nonlinear and nonaffine. By using the Lyapunov Razumikhin approach, we deduce general conditions for stabilizing the closed-loop system. Moreover stabilizing state feedback control laws are proposed.
This work is concerned with the design of a chaotic communication system based on a modified inclusion method. For this, we propose a bidirectional transmitter-receiver communication scheme whereby the transmitter is a Rossler oscillator and the receiver is a corresponding nonlinear high gain observer. The main motivation to employ a bidirectional...
This work proposes a chaotic cryptographic system based on a modified inclusion method in combination with indirect coupled synchronisation to create a chaotic private key. A Rossler type chaotic oscillator is used to embed an encrypted message in its dynamics as well as to drive the piece-wise linear function of a Chua type system, used to create...
The spacecraft payload operational time (SPOT) is amongst the main critical design considerations that must be optimised and validated during the system engineering analysis of a spacecraft mission. This requirement becomes more demanding for a communication satellite mission that relies on the functionality of the payload for its operation and ser...
In this paper, an observer-based secure communication system composed of four chaotic oscillators is proposed. Observer based synchronization is achieved between two of these oscillators and employed as a transmitter and a receiver. The other two oscillators are indirectly coupled and are employed as keystream generators. The novelty lies in the ge...
In this work, the synchronization of two indirectly coupled discrete-time chaotic systems is first demonstrated. Next, the result is then applied for presenting a secure communication system. The novelty of the proposed method lies on the generation of encryption key stream for discrete-time chaotic systems using indirect coupled synchronization. S...
In this paper, a new a secure communication scheme using chaotic signal for transmitting binary digital signals is proposed and which is then implemented on a Digital Signal Processor (DSP) board. The method uses the idea of indirect coupled synchronization for generating the same keystream in the transmitter and receiver side. This chaotic keystre...
In this paper, a modified chaotic shift keying method is proposed to transmit digital bits securely over a communication channel. The scheme is based upon encrypting the digital bits 0 and 1 into infinite levels by applying the keystream such that there is no recognisable pattern in the encoded transmitted signal. The encoded transmitting signal ge...
Questions
Questions (3)
We are looking for a self-motivated research focused candidate for an 18 month Post-Doctoral Research Associate (PDRA) position at the School of Engineering, Manchester Metropolitan University.
The primary responsibility of the PDRA is to develop innovative solutions for emerging research problems in the broad area of wireless communication systems and signal processing. It is expected that you will work on areas such as low-power wireless communication for cyber-physical systems, Internet of Things, 5G or physical layer security.
Apply for the job here at
For an informal discussion, please contact Dr Rupak Kharel (r.kharel@mmu.ac.uk)
Please share this within your network who might be interested on it.