Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes nove ....Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes novel dynamic group key management and denial of service protection schemes, develops new security mechanisms for ad hoc routing, provides new insights into formal reasoning of security and demonstrates and evaluates practical secure wireless mobile applications.Read moreRead less
Special Research Initiatives - Grant ID: SR0354880
Funder
Australian Research Council
Funding Amount
$10,000.00
Summary
Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national intere ....Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national interest. It will do so by bringing together for the first time, academic, government and business people from a vast array of backgrounds, and whose interests lie across a spectrum of commercial, legal, policy and research outcomes.Read moreRead less
Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will he ....Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will help to maintain high research profile of Australian researchers, to increase the capacity for consultancy and contract work, and provide a cutting-edge information technology for the Australian telecommunications industry, business and government (Priority 3 - Frontier Technologies). Read moreRead less
Managing Knowledge in Web-Driven Organisational Evolution. Organisations are increasingly concerned with the effective utilisation of Web technologies, and especially the ways in which these technologies can be used to improve their business. Effective management of knowledge about the interplay between the organisation and technical drivers of this technology adoption will enable a much-enhanced process for leveraging emerging information and communication technologies. This project aims to li ....Managing Knowledge in Web-Driven Organisational Evolution. Organisations are increasingly concerned with the effective utilisation of Web technologies, and especially the ways in which these technologies can be used to improve their business. Effective management of knowledge about the interplay between the organisation and technical drivers of this technology adoption will enable a much-enhanced process for leveraging emerging information and communication technologies. This project aims to link related research at UTS and Southampton University to understand how tools might support this knowledge management. Outcomes will include the creation of specific tools (and techniques for using them) within the context of managing organisational uptake of new technologies.Read moreRead less
Cross-Correlated Security and Service Quality in Heterogeneous Mobile Communication Networks. Mobile telecommunication infrastructures constitute the vital elements of all developed countries and therefore their reliability and integrity has a profound role in a sustained national economy progress. This project will provide a uniquely practical and long-term solution to the Internet security threat even after introduction of new mobile applications and services. The project will put Australia on ....Cross-Correlated Security and Service Quality in Heterogeneous Mobile Communication Networks. Mobile telecommunication infrastructures constitute the vital elements of all developed countries and therefore their reliability and integrity has a profound role in a sustained national economy progress. This project will provide a uniquely practical and long-term solution to the Internet security threat even after introduction of new mobile applications and services. The project will put Australia on the frontbench of the extensive research activities worldwide in the field of mobile network security and quality of service. This project will protect the nation's most valuable data infrastructure from service interruption as a result of a sudden data traffic load increase.Read moreRead less
Providing End-to-End Quality of Service to Internet Applications. Current Internet only supports limited quality of service (QoS) within isolated domains. This project allows critical applications to be deployed over the global Internet. The project employs a programmable architecture for composing services and intelligent software elements for negotiating acceptable QoS responses for individual application flows over multiple administrative domains. The architecture employs DiffServ's aggregati ....Providing End-to-End Quality of Service to Internet Applications. Current Internet only supports limited quality of service (QoS) within isolated domains. This project allows critical applications to be deployed over the global Internet. The project employs a programmable architecture for composing services and intelligent software elements for negotiating acceptable QoS responses for individual application flows over multiple administrative domains. The architecture employs DiffServ's aggregation property to make it scalable for the Internet core. Successful outcomes would open the floodgates, allowing the development and deployment of applications such as high quality videoconferences, live sport broadcasts, remote medical services, network games, real-time on-line educations, and multimedia distributions.
Read moreRead less
Fair Intelligent Quality of Service Control and Path Discovery Mechanisms for Internet Scalable Architectures. Until now the Internet only provides best effort service without guaranteeing the timeliness or actual delivery of data. Quality of Service (QoS) architectures have been proposed but not deployed due to a fundamental problem: either the architecture is not scalable or it does not guarantee end-to-end QoS. The project tackles the problem by introducing mechanisms for network path discove ....Fair Intelligent Quality of Service Control and Path Discovery Mechanisms for Internet Scalable Architectures. Until now the Internet only provides best effort service without guaranteeing the timeliness or actual delivery of data. Quality of Service (QoS) architectures have been proposed but not deployed due to a fundamental problem: either the architecture is not scalable or it does not guarantee end-to-end QoS. The project tackles the problem by introducing mechanisms for network path discovery in the network core. The solution allows an integration of both scalability and end-to-end QoS architectures. The outcomes allow network providers to provision network resources efficiently, to develop competitive Internet-based products; and the service providers to develop quality services such as high quality IP phone, multimedia distributions.
Read moreRead less
Special Research Initiatives - Grant ID: SR0354721
Funder
Australian Research Council
Funding Amount
$10,000.00
Summary
Frontier and Security Technologies Microfabrication Network. This Initiative will conduct a comprehensive survey of Australia's resources in micro-fabrication, a key enabling technology for two national research priority areas, and generate new collaboration opportunities that capitalise on this resource base and open it to a wider range of applications. The Initiative will focus on photonics, nano-materials and security applications, and will identify gaps in micro-fabrication capabilities requ ....Frontier and Security Technologies Microfabrication Network. This Initiative will conduct a comprehensive survey of Australia's resources in micro-fabrication, a key enabling technology for two national research priority areas, and generate new collaboration opportunities that capitalise on this resource base and open it to a wider range of applications. The Initiative will focus on photonics, nano-materials and security applications, and will identify gaps in micro-fabrication capabilities required to support research in these areas. The outcomes will be a key element in a national strategic plan for these areas of national priority. The web site will demonstrate key features of the IT-based support features of a micro-fabrication network.Read moreRead less
A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucr ....A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucrative opportunity for expanding the export capabilities of Australian ICT industry.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less