Development of a new transport layer protocol to provide secure broadband internet connections via satellite to rural and remote areas. Satellite links form an essential part of broadband connectivity to rural and remote areas. Effective use of the internet over satellite links is therefore essential if B2B (Business-to-Business) and B2C (Business-to-Consumer) E-commerce is to develop in these areas. In many application networks, particularly virtual private networks (VPN), secure transmission ....Development of a new transport layer protocol to provide secure broadband internet connections via satellite to rural and remote areas. Satellite links form an essential part of broadband connectivity to rural and remote areas. Effective use of the internet over satellite links is therefore essential if B2B (Business-to-Business) and B2C (Business-to-Consumer) E-commerce is to develop in these areas. In many application networks, particularly virtual private networks (VPN), secure transmission is important to avoid fraud and maintain privacy.
Satellite links introduce a long delay (latency) in the transmission path and existing secure internet protocols do not handle this well. This is because in many situations, it is a requirement that the secure connection be implemented not only independently of the
satellite service provider but also in a reliable and efficient way.
This project will develop new practical solutions so that secure and reliable end-to-end connections can be provided over the satellite links.
Read moreRead less
Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes nove ....Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes novel dynamic group key management and denial of service protection schemes, develops new security mechanisms for ad hoc routing, provides new insights into formal reasoning of security and demonstrates and evaluates practical secure wireless mobile applications.Read moreRead less
Special Research Initiatives - Grant ID: SR0354880
Funder
Australian Research Council
Funding Amount
$10,000.00
Summary
Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national intere ....Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national interest. It will do so by bringing together for the first time, academic, government and business people from a vast array of backgrounds, and whose interests lie across a spectrum of commercial, legal, policy and research outcomes.Read moreRead less
Efficient and Fair Traffic Control for a Multi-Service Internet. Australia relies very heavily on its
telecommunications infrastructure due to its
geographic dispersion. For the same reason,
it cannot afford to invest in inefficient infrastructure.
Our novel and practical Internet congestion control scheme will overcome current weaknesses in the Internet, and will enable the Australian telecommunication service industry to provide a better quality of service to the customers (including Aust ....Efficient and Fair Traffic Control for a Multi-Service Internet. Australia relies very heavily on its
telecommunications infrastructure due to its
geographic dispersion. For the same reason,
it cannot afford to invest in inefficient infrastructure.
Our novel and practical Internet congestion control scheme will overcome current weaknesses in the Internet, and will enable the Australian telecommunication service industry to provide a better quality of service to the customers (including Australian industries and rural communities) and at lower cost. This project will put Australia on the international stage as a leading contributor to Internet technology. We will provide training for PhD students and postdoctoral fellows in the important area of Internet traffic engineering and control.Read moreRead less
Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will he ....Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will help to maintain high research profile of Australian researchers, to increase the capacity for consultancy and contract work, and provide a cutting-edge information technology for the Australian telecommunications industry, business and government (Priority 3 - Frontier Technologies). Read moreRead less
Managing Knowledge in Web-Driven Organisational Evolution. Organisations are increasingly concerned with the effective utilisation of Web technologies, and especially the ways in which these technologies can be used to improve their business. Effective management of knowledge about the interplay between the organisation and technical drivers of this technology adoption will enable a much-enhanced process for leveraging emerging information and communication technologies. This project aims to li ....Managing Knowledge in Web-Driven Organisational Evolution. Organisations are increasingly concerned with the effective utilisation of Web technologies, and especially the ways in which these technologies can be used to improve their business. Effective management of knowledge about the interplay between the organisation and technical drivers of this technology adoption will enable a much-enhanced process for leveraging emerging information and communication technologies. This project aims to link related research at UTS and Southampton University to understand how tools might support this knowledge management. Outcomes will include the creation of specific tools (and techniques for using them) within the context of managing organisational uptake of new technologies.Read moreRead less
Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic ....Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.Read moreRead less
Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less
Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Throu ....Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Through the expertise and experience gained with this project, Australia's excellence in information security research will be reinforced. The training of PhD and Honours students will provide a much needed source of highly trained information security professionals.Read moreRead less
Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computatio ....Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computational and storage demands. This project will study five recently proposed public key algorithms and assess their suitability for various secure applications. These results are of significant potential value in Australia's electronic commerce market.Read moreRead less