Development of a new transport layer protocol to provide secure broadband internet connections via satellite to rural and remote areas. Satellite links form an essential part of broadband connectivity to rural and remote areas. Effective use of the internet over satellite links is therefore essential if B2B (Business-to-Business) and B2C (Business-to-Consumer) E-commerce is to develop in these areas. In many application networks, particularly virtual private networks (VPN), secure transmission ....Development of a new transport layer protocol to provide secure broadband internet connections via satellite to rural and remote areas. Satellite links form an essential part of broadband connectivity to rural and remote areas. Effective use of the internet over satellite links is therefore essential if B2B (Business-to-Business) and B2C (Business-to-Consumer) E-commerce is to develop in these areas. In many application networks, particularly virtual private networks (VPN), secure transmission is important to avoid fraud and maintain privacy.
Satellite links introduce a long delay (latency) in the transmission path and existing secure internet protocols do not handle this well. This is because in many situations, it is a requirement that the secure connection be implemented not only independently of the
satellite service provider but also in a reliable and efficient way.
This project will develop new practical solutions so that secure and reliable end-to-end connections can be provided over the satellite links.
Read moreRead less
Lightweight security framework for Low-Power Wide-Area Network (LPWAN). This project aims to design and implement a lightweight security framework for Low Power Wide Area Networks (LPWAN). Smart cities are estimated to have a worldwide market value of US$1.5 trillion by 2020, and LPWAN will provide connectivity to 90% of low bandwidth, smart city applications such as smart metres and smart buildings. Many of these applications are deployed in mission-critical infrastructure such as airport, trai ....Lightweight security framework for Low-Power Wide-Area Network (LPWAN). This project aims to design and implement a lightweight security framework for Low Power Wide Area Networks (LPWAN). Smart cities are estimated to have a worldwide market value of US$1.5 trillion by 2020, and LPWAN will provide connectivity to 90% of low bandwidth, smart city applications such as smart metres and smart buildings. Many of these applications are deployed in mission-critical infrastructure such as airport, train station, hospital and government campuses, which have strong security requirements. Before the ubiquitous deployment of such new technology, a strong security framework needs to be developed and implemented to minimise enormous economic and social consequences of future malicious attacks to LPWAN.Read moreRead less
Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level arch ....Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level architecture of the solution.Read moreRead less
Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract Do ....Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract DoS, propose a new technique to identify malicious packets in the Internet to handle distributed DoS, consider a new approach using smart packets and develop enhancements to intrusion detection systems using data mining. Proposed techniques are analysed in practical situations.Read moreRead less
Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes nove ....Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes novel dynamic group key management and denial of service protection schemes, develops new security mechanisms for ad hoc routing, provides new insights into formal reasoning of security and demonstrates and evaluates practical secure wireless mobile applications.Read moreRead less
Trustworthy Sensor Networks: Theory and Implementation. The fundamental importance of this project is that we are developing algorithms for wireless sensor networks (WSNs) that provide accurate and trustworthy data to Australian researchers and users, so that they have confidence in the analysis of their data. The algorithms developed in this proposal will become essential for any large scale WSN. The research significantly leverages the resources of our international partners who complement our ....Trustworthy Sensor Networks: Theory and Implementation. The fundamental importance of this project is that we are developing algorithms for wireless sensor networks (WSNs) that provide accurate and trustworthy data to Australian researchers and users, so that they have confidence in the analysis of their data. The algorithms developed in this proposal will become essential for any large scale WSN. The research significantly leverages the resources of our international partners who complement our work with several million dollars of investment. The result will put Australia on the international stage as a significant contributor to WSN technologies. By training PhD students, the project will also enrich local expertise in the technologies.Read moreRead less
Quality of Service in 3G Wireless Systems with Hybrid Networks. The increasing demand of providing Internet-based services over the mobile handsets has led to the transition from circuit-based 2G systems to packet-based network architectures in the emerging 3G systems. A major technical challenge for this paradigm shift is maintaining quality of services (QoS) for the existing data and voice and future Internet services such as streaming multimedia over such packet switching networks. This proje ....Quality of Service in 3G Wireless Systems with Hybrid Networks. The increasing demand of providing Internet-based services over the mobile handsets has led to the transition from circuit-based 2G systems to packet-based network architectures in the emerging 3G systems. A major technical challenge for this paradigm shift is maintaining quality of services (QoS) for the existing data and voice and future Internet services such as streaming multimedia over such packet switching networks. This project aims to investigate end-to-end QoS solutions in the 3G systems. Australian mobile Internet and voice carriers will significantly benefit from this technology.Read moreRead less
Efficient and Fair Traffic Control for a Multi-Service Internet. Australia relies very heavily on its
telecommunications infrastructure due to its
geographic dispersion. For the same reason,
it cannot afford to invest in inefficient infrastructure.
Our novel and practical Internet congestion control scheme will overcome current weaknesses in the Internet, and will enable the Australian telecommunication service industry to provide a better quality of service to the customers (including Aust ....Efficient and Fair Traffic Control for a Multi-Service Internet. Australia relies very heavily on its
telecommunications infrastructure due to its
geographic dispersion. For the same reason,
it cannot afford to invest in inefficient infrastructure.
Our novel and practical Internet congestion control scheme will overcome current weaknesses in the Internet, and will enable the Australian telecommunication service industry to provide a better quality of service to the customers (including Australian industries and rural communities) and at lower cost. This project will put Australia on the international stage as a leading contributor to Internet technology. We will provide training for PhD students and postdoctoral fellows in the important area of Internet traffic engineering and control.Read moreRead less
Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even ....Tracing real Internet attackers through information correlation. If this research accomplishes successfully, it will be a big step forward on tracing Internet attackers in terms of traceback scope, accuracy, usability and deployment. This will empower authorities to control and punish Internet crime and terrorism. It will also greatly reduce the damage caused by Internet crime and terrorism. The prototype of the distributed information correlation tracing system can possibly be patented or even be commercialised. The capability of a nation to trace the real source of any attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity.Read moreRead less
Accurate Performance Modelling and Prediction of Cluster Computers. The tools, methodologies and data produced by this project will assist
Australian academic and industrial organisations in choosing the most
cost-effective cluster configurations for their specific high
performance computing requirements. It will also help an Australian
company to compete with increasing strength against the major
multinationals. The project will also draw together and promote future
research links between ....Accurate Performance Modelling and Prediction of Cluster Computers. The tools, methodologies and data produced by this project will assist
Australian academic and industrial organisations in choosing the most
cost-effective cluster configurations for their specific high
performance computing requirements. It will also help an Australian
company to compete with increasing strength against the major
multinationals. The project will also draw together and promote future
research links between two major academic institutions in this field.
Finally, the project will provide high-level training in research,
with industrial grounding, in the high performance computing industry.
Read moreRead less