📣 Help Shape the Future of UKRI's Gateway to Research (GtR)

We're improving UKRI's Gateway to Research and are seeking your input! If you would be interested in being interviewed about the improvements we're making and to have your say about how we can make GtR more user-friendly, impactful, and effective for the Research and Innovation community, please email gateway@ukri.org.

REMOTE: Resilient and Secure Multi-Access Interoperable Communication Fabric for TinyEdge

Lead Research Organisation: University of York
Department Name: Computer Science

Abstract

The Internet of Things (IoT) has permeated every aspect of our lives, from our homes to public spaces like train stations and hospitals. These smart devices, known as TinyEdge, are connected to the internet and provide us with numerous conveniences. For instance, we can use voice assistants like Alexa to control our lights and TV without getting up from our seats.

However, users are increasingly concerned about the lack of four key features that are essential for trustworthy and reliable systems: security, privacy, robustness, and resilience. Achieving these features requires a fundamental base layer of seamless interoperability, which has been largely overlooked by communication and networking research communities. As a result, there are limited methodologies, testing, and integration tools available, creating a gap between the communication infrastructure and the software stack that supports the networking and application layer.

With the emergence of new wireless technologies like 5G and 6G, the need for seamless interoperability is becoming more evident, and new research and development efforts in this direction have started from academia, industry, and government. This is especially evident in the UK government's Open Network R&D fund, which aims to build on the £250 million 5G Telecoms Supply Chain Diversification strategy.

Despite significant research initiatives in recent years, the IoT ecosystem is still unreliable, and one of the main challenges is the heterogeneity and scale of the ecosystem. Currently, there are over 12 billion smart devices from more than 10,000 device manufacturers and vendors, with a 200 billion pound market and an annual 18% growth rate. This entire IoT infrastructure is built over many communication technologies, creating massive integration and interoperability issues. Furthermore, the IoT smart devices at the edge of the networks (TinyEdge) are designed to work with only one or two specific technologies, limiting interoperability at the edge of the IoT ecosystem.

Interoperability issues not only hinder building privacy-preserved and secure IoT applications but also make management of the IoT edge (TinyEdge) networks difficult and inefficient on a larger scale. Our project seeks to address these challenges by examining the interoperability needs of TinyEdge networks and assessing various communication technologies such as Wifi, Zigbee, Bluetooth, Thead, 6LoWPAN, Z-Wave, 5G, LTE, Sigfox, NB-IoT, and LoraWAN. We will explore diverse network topologies and TinyEdge architectures to enable efficient service and application management and orchestration. Furthermore, we will develop an open-source communication framework that can be customised for different IoT applications, guaranteeing seamless connectivity, data rates, latency, security, energy efficiency, resilience, data privacy, and reliability. Finally, we will assess the effectiveness of our proposed architecture in meeting various quality-of-service (QoS), security, energy, resilience, and reliability requirements by conducting two small-scale use case studies. The outcomes of these studies will be shared with academics, industry experts, and other stakeholders.

Our work will have a significant long-term impact by providing systematic design and benchmarks, as well as open-source software tools to build and test new IoT services and applications while prioritising interoperability. For example, our research will facilitate privacy-preserved information exchange for autonomous vehicles over existing IoT infrastructure, allowing for more efficient and secure communication. Our team has a proven track record in this interdisciplinary research area, which intersects communication network, operating system, and networking, and we believe that our ambitious goal is supported by comprehensive research and resource planning and collaboration with partners.
 
Description UKTIN Expert Wireless Working Group
Geographic Reach National 
Policy Influence Type Participation in a guidance/advisory committee
Impact The white paper provided detailed insights into the UK's wireless capabilities and identified key gaps, contributing to the enhancement of education and skill levels within the telecom industry workforce.
URL https://uktin.net/sites/default/files/2024-02/FCP%20Wireless%20Networking%20%28C%29.pdf
 
Description CHEDDAR: Communications Hub for Empowering Distributed clouD computing Applications and Research - TMF uplift
Amount £8,558,479 (GBP)
Funding ID EP/Y037421/1 
Organisation Engineering and Physical Sciences Research Council (EPSRC) 
Sector Public
Country United Kingdom
Start 12/2023 
End 03/2025
 
Title Research testbed for wireless security vulnerability testing 
Description A dedicated testbed was designed for experimenting with Thread networking, featuring a wall-mounted acrylic panel for convenient device placement. The setup comprised a 20-node Thread network, including a Border Router (BR), four Full Thread Devices (FTDs), and fifteen Minimal Thread Devices (MTDs). Nordic Semiconductor nRF5340DK development boards were used for the FTDs, while nRF52840 USB Dongles were selected for the MTDs. Each Thread device was connected to a Raspberry Pi 5 (RPi) via USB in groups of three MTDs and one FTD per RPi, supplying power and a UART link for debugging. The BR was implemented using a networked RPi and an nRF5340DK. This testbed enabled security and vulnerability assessments, including replay attacks, battery depletion attacks, denial-of-service attacks, and radio jamming attacks. 
Type Of Material Improvements to research infrastructure 
Year Produced 2025 
Provided To Others? Yes  
Impact This enables other researchers to build and test similar testbeds for Home IoT. Undergraduate (UG) and postgraduate (PG) students can experiment with their ideas and develop their own solutions. The research paper and posters on this work have been accepted at top security conferences and workshops. 
URL https://github.com/SystronLab/thread-edge-testbed
 
Description IIT Kanpur - India and SystronLab 
Organisation Indian Institute of Technology Kanpur
Country India 
Sector Academic/University 
PI Contribution The Research Knowledge Transfer collaboration with c3iHub - https://c3ihub.org/
Collaborator Contribution The Research Knowledge Transfer collaboration with c3iHub at IITK- https://c3ihub.org/
Impact The research visit and collaboration provide a better understanding of the research facilities and cybersecurity expertise at c3iHub at IITK, potentially paving the way for long-term research collaboration.
Start Year 2024
 
Title CSP Models and Sound Animation for Security Protocols: Diffie-Hellman and Needham-Schroeder 
Description This repository (https://github.com/SystronLab/animation-of-security-protocols) contains CSP models for two security protocols: the Diffie-Hellman key exchange protocol and the Needham-Schroeder public key protocol. These models are used in Isabelle/HOL to generate Haskell code for sound animation. The generated code is also available in this repository. Further details can be found in the paper "User-Guided Verification of Security Protocols via Sound Animation" (DOI: 10.1007/978-3-031-77382-2_3). 
Type Of Technology Software 
Year Produced 2024 
Open Source License? Yes  
Impact The repository provides a valuable resource for the formal verification and analysis of security protocols by offering CSP models of the Diffie-Hellman key exchange protocol and the Needham-Schroeder public key protocol. By leveraging Isabelle/HOL to generate Haskell code for sound animation, this work enhances the accessibility and practicality of verifying security protocols, ensuring their correctness and robustness. The ability to animate these protocols allows researchers and practitioners to better understand potential vulnerabilities, explore attack scenarios, and validate protocol properties in a more interactive and intuitive manner. Furthermore, by making the generated code publicly available, the repository fosters collaboration and further advancements in the field of security protocol verification, contributing to the broader goal of building more secure and resilient communication systems. 
URL https://dl.acm.org/doi/10.1007/978-3-031-77382-2_3
 
Title MUD-UI: A tool to manage and edit Manufacturer Usage Description (MUD) files associated with IoT devices from the browser. 
Description A tool to manage and edit Manufacturer Usage Description (MUD) files from the browser. 
Type Of Technology Software 
Year Produced 2025 
Open Source License? Yes  
Impact This paper introduces MUD-UI, a user-centric solu- tion designed to empower non-technical users in managing IoT security policies through an intuitive graphical inter- face. MUD-UI enables users to view, modify, and enforce MUD policies without requiring deep technical knowledge, bridging the gap between manufacturer-imposed security configurations and user-driven control. 
URL https://github.com/SystronLab/osMUD-UI
 
Description IoT Tech Expo World Series 2025 - Panel 2: Transforming IoT Cybersecurity in 2025 and Beyond (6th Feb 2025) 
Form Of Engagement Activity A formal working group, expert panel or dialogue
Part Of Official Scheme? No
Geographic Reach International
Primary Audience Industry/Business
Results and Impact The discussion highlighted the rising sophistication of cyberattacks and the critical need for robust IoT security, emphasizing firmware security and privacy by design. AI and machine learning are reshaping security strategies through predictive threat modeling and real-time anomaly detection. Balancing innovation with regulatory compliance remains a challenge in a data-driven world. The key takeaway: As IoT expands, cybersecurity must shift from reactive measures to proactive, intelligent defense mechanisms.
Year(s) Of Engagement Activity 2025
URL https://www.iottechexpo.com/global/agenda-2025/
 
Description Josh Levett presented at RIPE88 plenary session 
Form Of Engagement Activity A talk or presentation
Part Of Official Scheme? No
Geographic Reach International
Primary Audience Industry/Business
Results and Impact The presentation covered an approach to Internet topology collection and measurement using publicly available Internet data, including sources from the RIPE NCC, along with key insights and results. This serves as a valuable knowledge transfer from academia to industry professionals.
Year(s) Of Engagement Activity 2024
URL https://ripe88.ripe.net/programme/meeting-plan/plenary/#tue2
 
Description Josh Levett presented at the Yorkshire Innovation in Science and Engineering Conference at the University of Hull 
Form Of Engagement Activity A talk or presentation
Part Of Official Scheme? No
Geographic Reach Regional
Primary Audience Postgraduate students
Results and Impact In the work presented at YISEC 2024, we outline our approach to building a new, Internet-scale virtual testbed for internetwork routing protocols.
Year(s) Of Engagement Activity 2024
URL https://systronlab.github.io/news/yisec-2024
 
Description Panel 1: The Future of Connectivity at IoT Tech Expo World Series 2025 
Form Of Engagement Activity A formal working group, expert panel or dialogue
Part Of Official Scheme? No
Geographic Reach National
Primary Audience Industry/Business
Results and Impact The panel explored the transformative role of emerging technologies like 5G, satellite communications, and low-power networks in driving IoT innovation. Discussions covered scaling challenges in expanding IoT networks while maintaining reliability, the growing need for robust security in a hyper-connected world, and the adaptability of 3GPP RedCap NR in optimizing device design for efficiency and lower power consumption. The key takeaway emphasized that connectivity is not just about speed but also about resilience, security, and adaptability across industries.
Year(s) Of Engagement Activity 2025
URL https://www.iottechexpo.com/global/agenda-2025/
 
Description Poonam Yadav and Josh Levett participation in the UKI-FNI BT Hothouse in Future Networks workshop 
Form Of Engagement Activity Participation in an activity, workshop or similar
Part Of Official Scheme? No
Geographic Reach National
Primary Audience Professional Practitioners
Results and Impact Dr. Poonam Yadav and Josh Levett attended the EPSRC UK-India Future Networks Initiative (UKI-FNI) Hothouse workshop at BT's Adastral Park. The event featured keynotes and breakout sessions on future telecoms, AI, regulatory challenges, business models, and academic-industry collaboration for social good.
Year(s) Of Engagement Activity 2024
URL https://www.ukifni.org/
 
Description Poonam presents to the IoT Working Group at RIPE88 
Form Of Engagement Activity A talk or presentation
Part Of Official Scheme? No
Geographic Reach International
Primary Audience Industry/Business
Results and Impact The RIPE IoT Working Group was informed about the identification of security weaknesses in Thread networks for the Internet of Things (IoT). Recognizing these vulnerabilities is essential for improving the resilience and reliability of connected devices. This research facilitates the development of stronger security protocols to protect IoT ecosystems from threats such as unauthorized access, data breaches, and denial-of-service attacks. Enhancing Thread network security benefits various sectors, including smart homes, industrial automation, and healthcare, while fostering greater trust in IoT adoption. This work advances secure IoT frameworks, ensuring that future deployments remain robust and scalable against evolving cybersecurity challenges.
Year(s) Of Engagement Activity 2024
URL https://ripe88.ripe.net/programme/meeting-plan/iot-wg/
 
Description The DNV Spadeadam Research and Testing facility 
Form Of Engagement Activity Participation in an activity, workshop or similar
Part Of Official Scheme? No
Geographic Reach Regional
Primary Audience Industry/Business
Results and Impact Dr. Poonam Yadav's and Dr Olufemi Olayiwola from the Cehddar team visited to the DNV Research and Testing Facility at Spadeadam, alongside members of the University of York's Centre for Assuring Autonomy, fostered valuable discussions on safe and ethical AI and autonomous systems. Hosted by Graham Faiz and the DNV team, the visit provided critical insights into de-risking energy transition and ensuring the resilience of autonomous technologies in high-stakes environments. This engagement strengthens industry-academia collaboration, supporting the development of rigorous safety frameworks and best practices for AI-driven decision-making in critical sectors such as energy, transportation, and infrastructure.
Year(s) Of Engagement Activity 2024
URL https://systronlab.github.io/news/visit-to-dnv-digital-energy