Emerging Communication Systems research group

The Emerging Communication Systems (ECoS) group investigates the intersection of wireless communications, machine learning, low-power design, and security.
Description
The Emerging Communication Systems (ECoS) group investigates the intersection of wireless communications, machine learning (ML), low-power design, and security. Our research explores the synergies between these domains to enable future communication systems that are energy-efficient, robust, and secure.
Research Interests
Low-Power Communication Systems: We explore system-level and theoretical foundations for energy-efficient communication, including battery-free, backscatter-enabled technologies, data-driven battery research and battery-aware system design. These efforts aim to support sustainable, always-on connectivity for the Internet of Things and other constrained devices.
Machine Learning and Wireless Communications: We propose wireless communication systems that support distributed learning tasks, with a focus on learning under dynamic scenarios with device constraints, communication-efficient learning, and over-the-air aggregation. We also investigate machine learning methods to enhance wireless communication systems, including tasks such as transceiver design, resource allocation, and channel estimation.
ML-Driven Network and Service Management: Our research includes the development of intelligent frameworks for network management, service assurance, and performance prediction in next-generation systems. This includes neural architecture search, knowledge exposure, and dependable operations for future networks and ML-enhanced IoT applications.
Cybersecurity: Our group advances wireless communication theory and practice while addressing core challenges in information, network, and wireless security. We aim to design systems that are robust, privacy-aware, and secure by default, suitable for future infrastructures.
Current Research Projects
- Security for backscatter and beyond (VR)
- Sustainable IoT (design space of organic batteries, Vinnova)
- Robust and secure IoT (intrusion detection systems, Vinnova)
- Resilient IoT (MSB)
- Backscatter and intermittent computing (SSF)
Courses
- 1DT052: Computer Networks I (5 credits)
- 1DT074: Computer Networks II (10 credits)
- 1DT066: Distributed Information Systems (5 credits)
- 1DT095: Wireless Communication and Networked Embedded Systems (5 credits)
- 1DT195: Wireless Communication and Networked Embedded Systems, Project (5 credits)
- 1DT114: Data Security & Privacy (5 credits)
- 1DT118: Cybersecurity Analysis (5 credits, in planning)
Open Positions
All PhD, postdoctoral, and researcher positions are announced at the university level. Please monitor the following link for openings.
Group members
Publications
Machine Learning for Spectrum Sharing: A Survey
Part of Foundations and Trends® in Networking, p. 1-159, 2024
Blind Federated Learning via Over-the-Air q-QAM
Part of IEEE Transactions on Wireless Communications, p. 19570-19586, 2024
- DOI for Blind Federated Learning via Over-the-Air q-QAM
- Download full text (pdf) of Blind Federated Learning via Over-the-Air q-QAM
Agent Selection Framework for Federated Learning in Resource-Constrained Wireless Networks
Part of IEEE Transactions on Machine Learning in Communications and Networking, p. 1265-1282, 2024
- DOI for Agent Selection Framework for Federated Learning in Resource-Constrained Wireless Networks
- Download full text (pdf) of Agent Selection Framework for Federated Learning in Resource-Constrained Wireless Networks
Sub-Band Full-Duplex for 5G New Radio: Challenges, Solutions and Performance
Part of 57th Asilomar Conference on Signals, Systems, and Computers, IEEECONF, p. 167-173, 2023
SumComp: Coding for Digital Over-the-Air Computation via the Ring of Integers
Part of IEEE Transactions on Communications, p. 752-767, 2025
- DOI for SumComp: Coding for Digital Over-the-Air Computation via the Ring of Integers
- Download full text (pdf) of SumComp: Coding for Digital Over-the-Air Computation via the Ring of Integers
FedCau: A Proactive Stop Policy for Communication and Computation Efficient Federated Learning
Part of IEEE Transactions on Wireless Communications, p. 11076-11093, 2024
- DOI for FedCau: A Proactive Stop Policy for Communication and Computation Efficient Federated Learning
- Download full text (pdf) of FedCau: A Proactive Stop Policy for Communication and Computation Efficient Federated Learning
Computing Functions Over-the-Air Using Digital Modulations
Part of ICC 2023, p. 5780-5786, 2023
Decomposing and Tracing Mutual Information by Quantifying Reachable Decision Regions
Part of Entropy, 2023
- DOI for Decomposing and Tracing Mutual Information by Quantifying Reachable Decision Regions
- Download full text (pdf) of Decomposing and Tracing Mutual Information by Quantifying Reachable Decision Regions
Demo: An Educational Platform to Learn Radio Frequency Wireless Communication
Part of Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services, p. 600-601, 2023
PHY-IDS: a physical-layer spoofing attack detection system for wearable devices
Part of WearSys '20, 2020
Predicting Round-Trip Time Distributions in IoT Systems using Histogram Estimators
2020
Sensitivity of radiometric fingerprint against wireless channel: Poster Abstract
Part of SenSys '20, p. 719-720, 2020
Tiek: Two-tier Authentication and Key Distribution for Wearable Devices
Part of 2019 INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), IEEE , 2019, 2019
Do Multiple Bits per Symbol Increase the Throughput of Ambient Backscatter Communications?
Part of EWSN '16 Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks, p. 355-360, 2016
Towards even coverage monitoring with opportunistic sensor networks
Part of Proc. 11th ACM MobiCom Workshop on Challenged Networks, p. 81-86, 2016
Poster Abstract:BouKey: Location-Based Key Sharing Using Visible LightCommunication
2016
Security in Visible Light Communication: Novel Challenges and Opportunities
Part of Sensors & Transducers Journal, p. 9-15, 2015
Considering Multi-Contact Encounters in Opportunistic Networks
Part of Proceedings of the 10th ACM MobiCom Workshop on Challenged Networks, 2015
Estimating packet delivery ratio for arbitrary packet sizes over wireless links
Part of IEEE Communications Letters, p. 609-612, 2015
Comparing wireless flooding protocols using trace-based simulations
Part of EURASIP Journal on Wireless Communications and Networking, 2013
- DOI for Comparing wireless flooding protocols using trace-based simulations
- Download full text (pdf) of Comparing wireless flooding protocols using trace-based simulations
Towards adaptive zero-knowledge protocols: A case study with Fiat–Shamir identification protocol
Part of Proc. 9th Swedish National Computer Networking Workshop, p. 67-70, 2013
Skitracker: Measuring skiing performance using a body-area network
Part of Proc. 12th International Conference on Information Processing in Sensor Networks, p. 319-320, 2013
SoNIC: Classifying interference in 802.15.4 sensor networks
Part of Proc. 12th International Conference on Information Processing in Sensor Networks, p. 55-66, 2013
A Long-Term Study on the Effects of Meteorological Conditions on 802.15.4 Links
Part of 8th Swedish National Computer Networking Workshop, Stockholm, June 7-8, 2012
The impact of trace and adversary models on location privacy provided by K-anonymity
Part of Proc. 1st Workshop on Measurement, Privacy, and Mobility, 2012
Mobile Sources in an Information-Centric Network with Hierarchical Names: An Indirection Approach
Part of Proc. 7th Swedish National Computer Networking Workshop, 2011
Repeatable experiments with mobile nodes in a relocatable WSN testbed
Part of Computer journal, p. 1973-1986, 2011
Search-Based Picture Sharing With Mobile Phones: Demo
Part of ACM MobiHoc, 2009
Using Search to Enhance Picture Sharing with Mobile Phones: Demo
Part of ACM MobiSys, 2009
An Interactive Test-bed for Heterogeneous Wireless Sensor Networks.
Part of DCOSS demo proceedings, 2008
Experiences from measuring human mobility using Bluetooth inquiring devices
Part of In Proceedings of the 1st international In Proceedings of the 1stinternational workshop on System evaluation for mobile platforms (MobiEval'07), p. 15-20, 2007
Lower trees with fixed degrees: a recipe for efficient secure hierarchical aggregation in WSNs
Part of 2011 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), p. 659-664, 2011
Interest dissemination in a searchable data-centric opportunistic network
Part of Proc. European Wireless Conference, p. 889-895, 2010
Repeatable experiments with mobile nodes in a relocatable WSN testbed
Part of Proc. 6th IEEE International Conference on Distributed Computing in Sensor Systems Workshops, p. 1-6, 2010
Sensei-UU: a flexible testbed for heterogeneous wireless sensor networks
Part of Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops, 2009. TridentCom 2009. 5th International Conference on, p. 1-2, 2009
Sensei-UU: a relocatable sensor network testbed
Part of Proc. 5th ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization, p. 63-70, 2010
Sensei-UU — a relocatable WSN testbed supporting repeatable node mobility
Part of Testbeds and Research Infrastructures, p. 612-614, 2011
2009
Secure Overlays: Making Static Key Distribution Schemes Work with Mobile Base Stations in WSNs
Part of Wired/Wireless Internet Communications, p. 386-397, 2010
Robust and flexible Internet connectivity for mobile ad hoc networks
Part of Ad hoc networks, p. 1-15, 2011
n-LDA: n-Layers Data Aggregation in Sensor Networks
Part of Proc. 28th International Conference on Distributed Computing Systems Workshops, p. 400-405, 2008
n-LQA: n-Layers Query Authentication in Sensor Networks
Part of 3rd IEEE International Workshop on Wireless and Sensor Networks Security (IEEE WSNS 2007), 2007
Comparison of Forwarding Strategies in Internet Connected MANETs
Part of ACM SIGMOBILE Mobile Computing and Communications Review, p. 72-76, 2004
Lessons from Experimental MANET Research
Part of Ad hoc networks, p. 221-233, 2005
Comparing Simulation, Emulation, and Real-World Experimental Results in Mobile Ad hoc Networks
Part of 6th Scandinavian Workshop on Wireless Ad-hoc Networks (ADHOC'06), 2006
Part of Proceedings of the 1st international workshop on System evaluation for mobile platforms (MobiEval'07), p. 29-34, 2007
Leveraging a power save protocol to improve performance in ad hoc networks
Part of ACM SIGMOBILE Mobile Computing and Communications Review, p. 51-52, 2007
ARPD: Asynchronous random key predistribution in the LEAP framework for Wireless Sensor Networks
Part of 3rd IEEE International Workshop on Wireless and Sensor Networks Security (IEEE WSNS 2007), 2007
Modeling Capacity in Ad Hoc Networks: Extended Poster Abstract
2006
Part of The Twelfth Annual International Conference on Mobile Computing and Networking (Mobicom2006), 2006
Part of IEEE Wireless Communications and Networking Conference, 2007
Testbed and Methodology for Experimental Evaluation of Opportunistic Networks
Part of 7th Scandinavian Workshop on Wireless Ad-hoc Networks (ADHOC'07), 2007
A model for evaluating asynchronous protocols in Ad hoc Networks
Part of 6th Scandinavian Workshop on Wireless Ad-hoc Networks (ADHOC'06), 2006
Accessing distributed proxy configurations
2002
Adaptive Resource-based Web Server Admission Control
Part of 7th IEEE Symposium on Computers and Communication, 2002
Beyond adhoc networking. Selfconfiguring Networks and Terminal
Part of The first COST-IST(EU)NSF(USA) Workshop on Exchanges and Trends in Networking, 2003
Creating distributed proxy configurations
2002
Handover for a portable communication device between local and wide area wireless networks
2010
Comparison of forwarding Strategies in Internet Connected MANETs
Part of ACM MobiHoc 2004, 2004
How a large ATM MTU causes deadlocks in TCP data transfers
Part of IEEE-ACM transactions on networking, p. 409-422, 1995
Increasing communication performance with a minimal-copy data path supporting ILP and ALF
Part of Journal of High Speed Networks, p. 203-214, 1996
Performance modeling of multiprocessor implementations of protocols
Part of IEEE/ACM Transactions on Networking, p. 262-273, 1998
Regression-Based Available Bandwidth Measurements
Part of Proc of the 2002 International Symposium on Performance Evaluation of Computer and Telecommunications, 2002
The applicability of integrated layer processing
Part of IEEE Journal on Selected Areas in Communications, p. 317-331, 1998
Towards predictable ILP performance controlling communication buffer cache effects
Part of Australian Computer Journal, p. 66-71, 1996
Basement: A Distributed Real-Time Architecture For Safety Critical Applications
Part of SNART Workshop, 2000
Part of Professorsinstallation 2000, Uppsala Universitet, 2000
A virtualized link layer with support for indirection
Part of ACM SIGCOMM Workshop on Future Directions in Network Architecture (FDNA'04), p. 28-34, 2004
A Testbed and Methodology for Experimental Evaluation of Wireless Mobile Ad hoc Networks
Part of Proceedings of The First International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM), 2005