Coronavirus (Covid-19): Latest updates and information
Skip to main content Skip to navigation

Matthew Bradbury

About Me

I am a research fellow in WMG. I completed my undergraduate masters degree at Warwick in 2013 and spent a short period at Hitachi Data Systems before returning to the Computer Science Department at Warwick to undertake my PhD. During my PhD I worked in the Fault Tolerant and Reliable Systems subgroup of the Systems and Software group under my supervisor Dr. Arshad Jhumka. I submitted my PhD in May 2018 and I worked in the Cyber Security Centre in WMG from April 2018 to March 2020. I am currently based in the Computer Science Department working on a research project I co-developed to perform trust-based task offloading from resource constrained devices to resource rich edge nodes funded by PETRAS.

Research

Postdoc

I have been involved with a number of research projects as part of my postdoc including the PETRAS Internet of Things Research Hub and the FAIR-SPACE (Future AI and Robotics) Hub. More details on the projects I have been a part of can be found here.

PhD

During my PhD I researched ways to provide Source Location Privacy (SLP) in ad-hoc wireless networks (i.e., Wireless Sensor Networks). There is a need to provide SLP because it has been shown that when a message is flooded through a network, an attacker can listen to the direction the message came from and make their way to the source of the message. In many situations it is important that the location of a message's source is not found. For example, if conservationists were monitoring panda habitat using a wireless sensor network to record where the pandas are, then poachers can use this network to follow the message back to the source and find the pandas.

My research involves developing algorithms that allow messages from the source to reach the sink, without an attacker discovering the location of the source. I collaborated with my fellow PhD students Chen and Jack who researched different aspects of SLP.

Teaching

During my PhD I was involved with teaching the following modules:

I organised WPCCS'16, the Computer Science student-led conference, assisted with the organisation of WPCCS'17, and assisted with the organisation of WPCCS'18.

Awards and Nominations

  • Received the Early Career Researcher of the Year award at the WMG Star Awards 2019
  • Received best-in-session presentation award at InfoCom 2017
  • Nominated for WATE PGR 2014/15 and 2016/17

Publications

The source code for the SLP algorithms presented in several of these papers can be found on GitHub. Also included are instructions on how to reproduce the results.

2021

  • Matthew Bradbury, Arshad Jhumka, and Tim Watson. Trust Assessment in 32 KiB of RAM: Multi-application Trust-based Task Offloading for Resource-constrained IoT Nodes. In Proceedings of the Symposium on Applied Computing, SAC'21. ACM, 22–26 March 2021. To Appear.
    [bibtex]

2020

  • Carsten Maple, Matthew Bradbury, Hu Yuan, Marie Farrell, Clare Dixon, Michael Fisher, and Uger Ilker Atmaca. Security-Minded Verification of Space Systems. In IEEE Aerospace Conference. Big Sky, Montana, USA, 7–14 March 2020. IEEE. doi:10.1109/AERO47225.2020.9172563.
    [bibtex] [file]
  • Matthew Bradbury, Carsten Maple, Uger Ilker Atmaca, and Sara Cannizzaro. Identifying Attack Surfaces in the Evolving Space Industry Using Reference Architectures. In IEEE Aerospace Conference. Big Sky, Montana, USA, 7–14 March 2020. IEEE. doi:10.1109/AERO47225.2020.9172785.
    [bibtex] [file]
  • Matthew Bradbury, Arshad Jhumka, and Carsten Maple. A Spatial Source Location Privacy-Aware Duty Cycle for Internet of Things Sensor Networks. ACM Transactions on Internet of Things, 2(1):1–31, 2020. In Press.
    [bibtex] [file]
  • Matthew Bradbury, Phillip Taylor, Ugur Ilker Atmaca, Carsten Maple, and Nathan Griffiths. Privacy Challenges with Protecting Live Vehicular Location Context. IEEE Access, 8:207465–207484, 2020. doi:10.1109/ACCESS.2020.3038533.
    [bibtex] [file]

2019

  • Matthew Bradbury, Arshad Jhumka, and Carsten Maple. The Impact of Decreasing Transmit Power Levels on FlockLab To Achieve a Sparse Network. In Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things, CPS-IoTBench '19, 7–12. New York, NY, USA, April 2019. ACM. doi:10.1145/3312480.3313171.
    [bibtex] [file]
  • Jasmine Grosso, Arshad Jhumka, and Matthew Bradbury. Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation. In 15th European Dependable Computing Conference (EDCC), 111–118. September 2019. doi:10.1109/EDCC.2019.00030.
    [bibtex] [file]
  • Marie Farrell, Matthew Bradbury, Michael Fisher, Louise A. Dennis, Clare Dixon, Hu Yuan, and Carsten Maple. Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages. In Peter Csaba Ölveczky and Gwen Salaün, editors, Software Engineering and Formal Methods, 471–490. Cham, 2019. Springer International Publishing. doi:10.1007/978-3-030-30446-1_25.
    [bibtex] [file]
  • Hu Yuan, Matthew Bradbury, Carsten Maple, and Chen Gu. Throughput Aware Authentication Prioritisation for Vehicular Communication Networks. In 90th IEEE Vehicular Technology Conference (VTC2019-Fall), 1–5. Sep. 2019. doi:10.1109/VTCFall.2019.8891375.
    [bibtex] [file]
  • Carsten Maple, Matthew Bradbury, Anh Tuan Le, and Kevin Ghirardello. A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis. Applied Sciences, 9(23):5101, November 2019. doi:10.3390/app9235101.
    [bibtex] [file]
  • Chen Gu, Matthew Bradbury, and Arshad Jhumka. Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks. Concurrency and Computation: Practice and Experience, 31(20):e5304, 2019. doi:10.1002/cpe.5304.
    [bibtex] [file]

2018

  • Chen Gu, Matthew Bradbury, Jack Kirton, and Arshad Jhumka. A Decision Theoretic Framework for Selecting Source Location Privacy Aware Routing Protocols in Wireless Sensor Networks. Future Generation Computing Systems, 87:514–526, 2018. doi:10.1016/j.future.2018.01.046.
    [bibtex] [file]
  • Matthew Bradbury, Arshad Jhumka, and Matthew Leeke. Hybrid Online Protocols for Source Location Privacy in Wireless Sensor Networks. Journal of Parallel and Distributed Computing, 115:67–81, May 2018. doi:10.1016/j.jpdc.2018.01.006.
    [bibtex] [file]
  • Jack Kirton, Matthew Bradbury, and Arshad Jhumka. Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks. Computer Networks, 146:125–137, 2018. doi:10.1016/j.comnet.2018.09.010.
    [bibtex] [file]

2017

  • Matthew Bradbury and Arshad Jhumka. A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks. In 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 409–416. August 2017. doi:10.1109/Trustcom/BigDataSE/ICESS.2017.265.
    [bibtex] [file] [presentation]
  • Arshad Jhumka and Matthew Bradbury. Deconstructing Source Location Privacy-aware Routing Protocols. In Proceedings of the Symposium on Applied Computing, SAC'17, 431–436. ACM, April 2017. doi:10.1145/3019612.3019655.
    [bibtex] [file] [presentation]
  • Chen Gu, Matthew Bradbury, and Arshad Jhumka. Phantom Walkabouts in Wireless Sensor Networks. In Proceedings of the Symposium on Applied Computing, SAC'17, 609–616. ACM, April 2017. doi:10.1145/3019612.3019732.
    [bibtex] [file] [presentation]
  • Jack Kirton, Matthew Bradbury, and Arshad Jhumka. Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks. In 37th IEEE International Conference on Distributed Computing Systems (ICDCS), 2200–2205. June 2017. doi:10.1109/ICDCS.2017.171.
    [bibtex] [file]
  • Matthew Bradbury and Arshad Jhumka. Understanding Source Location Privacy Protocols in Sensor Networks via Perturbation of Time Series. In IEEE INFOCOM, 1611–1619. May 2017. doi:10.1109/INFOCOM.2017.8057122.
    [bibtex] [file] [presentation]

2016

  • Joanna F. Laikin, Matthew Bradbury, Chen Gu, and Matthew Leeke. Towards Fake Sources for Source Location Privacy in Wireless Sensor Networks with Multiple Sources. In 15th IEEE International Conference on Communication Systems (ICCS'16), 1–6. December 2016. doi:10.1109/ICCS.2016.7833572.
    [bibtex] [file]

2015

  • Matthew Bradbury, Matthew Leeke, and Arshad Jhumka. A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks. In 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 531–538. August 2015. doi:10.1109/Trustcom.2015.416.
    [bibtex] [file] [presentation]
  • Chen Gu, Matthew Bradbury, Arshad Jhumka, and Matthew Leeke. Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks. In 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), 99–108. November 2015. doi:10.1109/PRDC.2015.9.
    [bibtex] [file]
  • Arshad Jhumka, Matthew Bradbury, and Matthew Leeke. Fake source-based source location privacy in wireless sensor networks. Concurrency and Computation: Practice and Experience, 27(12):2999–3020, 2015. doi:10.1002/cpe.3242.
    [bibtex] [file]

2014

  • Arshad Jhumka, Matthew Bradbury, and Sain Saginbekov. Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks. Journal of Parallel and Distributed Computing, 74(1):1789–1801, 2014. doi:10.1016/j.jpdc.2013.09.011.
    [bibtex] [file]

2013

  • Alasdair Thomason, Matthew Leeke, Matthew Bradbury, and Arshad Jhumka. Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy. In 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 667–674. July 2013. doi:10.1109/TrustCom.2013.81.
    [bibtex] [file]

2012

  • Arshad Jhumka, Matthew Bradbury, and Matthew Leeke. Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources. In 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 760–768. June 2012. doi:10.1109/TrustCom.2012.281.
    [bibtex] [file] [presentation]

PhD Thesis

  • Matthew Bradbury. Near Optimal Routing Protocols for Source Location Privacy in Wireless Sensor Networks: Modelling, Design and Evaluation. PhD thesis, University of Warwick, Coventry, UK, 2018. URL: http://wrap.warwick.ac.uk/115772.
    [bibtex] [file]

Technical Reports

  • Elijah Adegoke, Matthew Bradbury, Erik Kampert, Matthew Higgins, Tim Watson, Paul Jennings, Colin Ford, Guy Buesnel, and Steve Hickling. PNT Cyber Resilience: a Lab2Live Observer Based Approach, Report 1: GNSS Resilience and Identified Vulnerabilities. Technical Report 1, University of Warwick, Coventry, UK, April 2020. Version 1.0. URL: http://wrap.warwick.ac.uk/139519/.
    [bibtex] [file]
  • Matthew Bradbury, Elijah Adegoke, Erik Kampert, Matthew Higgins, Tim Watson, Paul Jennings, Colin Ford, Guy Buesnel, and Steve Hickling. PNT Cyber Resilience: a Lab2Live Observer Based Approach, Report 2: Specifications for Cyber Testing Facilities. Technical Report 2, University of Warwick, Coventry, UK, April 2020. Version 1.2. URL: http://wrap.warwick.ac.uk/139522/.
    [bibtex] [file]
  • Carsten Maple, Matthew Bradbury, Miles Elsden, Haitham Cruickshank, Hu Yuan, Chen Gu, and Phillip Asuquo. IoT Transport and Mobility Demonstrator: Cyber Security Testing on National Infrastructure. Technical Report, University of Warwick, Coventry, UK, May 2019.
    [bibtex] [file]

Event Reports

Profile Picture

Matthew Bradbury

M dot Bradbury at warwick dot ac dot uk

CS3.16

024 761 50997

Publications on WRAP

dblp
ResearchGate
Google Scholar

GitHub

ORCID iD iconorcid.org/0000-0003-4661-000X

Datasets for papers