FPGA Controller Architectures for Safety Critical Applications. The project industry partner, Invensys Rail Systems, has a major design group in Australia, who work with railway signalling systems throughout the world. Invensys are keen to adopt new technologies to more efficiently and effectively implement signalling functions. However, the safety-critical nature of railway signalling means that any new technology must be analysed in detail to bring it to an acceptable technical readiness lev ....FPGA Controller Architectures for Safety Critical Applications. The project industry partner, Invensys Rail Systems, has a major design group in Australia, who work with railway signalling systems throughout the world. Invensys are keen to adopt new technologies to more efficiently and effectively implement signalling functions. However, the safety-critical nature of railway signalling means that any new technology must be analysed in detail to bring it to an acceptable technical readiness level. The outcomes of this research will be an improved technical readiness level for FPGAs in signalling systems, and this will allow Invensys' Australian design group to develop new technologies and allow them to compete more effectively in the global marketplace.Read moreRead less
Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic ....Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.Read moreRead less
Onset Theory: Pushing the design envelope for textile composite structures. This study aims to exploit an innovative physics-based approach to predict the strength of textile composites. This is particularly important in areas such as aircraft design, where drastic weight savings are needed to allow designers to remain competitive in a low-carbon future. Improved theory and design tools will remove conservatism and account for a large part of these weight savings. The new approach is the first t ....Onset Theory: Pushing the design envelope for textile composite structures. This study aims to exploit an innovative physics-based approach to predict the strength of textile composites. This is particularly important in areas such as aircraft design, where drastic weight savings are needed to allow designers to remain competitive in a low-carbon future. Improved theory and design tools will remove conservatism and account for a large part of these weight savings. The new approach is the first to be consistent at all length scales — from atoms to aeroplanes — ensuring relevance for new and evolving composite material systems. A novel understanding of crack initiation in textile laminates is intended to reduce design and certification effort for new aircraft and help to design more efficient airframes at a lower cost.Read moreRead less
Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computatio ....Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computational and storage demands. This project will study five recently proposed public key algorithms and assess their suitability for various secure applications. These results are of significant potential value in Australia's electronic commerce market.Read moreRead less
A New Parallel Robot with breakthrough performance for Manufacturing of Aerospace Components - kinematic and dynamic synthesis, design optimisation and prototyping. The Gantry-Tau is a new parallel type robot manipulator that will have the large workspace benefit of traditional Gantry robots in addition to stiffness and accuracy benefits well beyond the capabilities of existing robots. Preliminary results have shown that the Gantry-Tau can become the most accurate Gantry manipulator to date, wit ....A New Parallel Robot with breakthrough performance for Manufacturing of Aerospace Components - kinematic and dynamic synthesis, design optimisation and prototyping. The Gantry-Tau is a new parallel type robot manipulator that will have the large workspace benefit of traditional Gantry robots in addition to stiffness and accuracy benefits well beyond the capabilities of existing robots. Preliminary results have shown that the Gantry-Tau can become the most accurate Gantry manipulator to date, with the potential of competing with dedicated machines in the manufacturing industry. The expected project outcome is a working prototype of the Gantry-Tau demonstrating machining performance on aerospace components, publications in high-ranked conferences and journals and several patent applications.Read moreRead less
Experimental validation of the strain invariant failure theory for carbon/epoxy composites. The project will be of national and international benefit, through providing a validated, enhanced design capability for advanced composite materials. Greater depth of understanding of such materials will allow more efficient structures to be designed in applications requiring high strength and stiffness, low weight, and resistance to corrosion and fatigue. Such applications include the aerospace, offshor ....Experimental validation of the strain invariant failure theory for carbon/epoxy composites. The project will be of national and international benefit, through providing a validated, enhanced design capability for advanced composite materials. Greater depth of understanding of such materials will allow more efficient structures to be designed in applications requiring high strength and stiffness, low weight, and resistance to corrosion and fatigue. Such applications include the aerospace, offshore and mining industries. There are, therefore, far-reaching benefits in industries important to Australia. In addition, the reputation of the Australian aerospace research industry will be promoted through a collaborative association with Boeing, a world leader in development of commercial aircraft.Read moreRead less
Secure Communications for Critical Infrastructure Control Systems. Control systems are crucial to the nation's critical infrastructure. They supervise and command the remote devices used in the energy distribution, water management, telecommunications, and transport industries. Historically, security has not been a concern in the design of control systems communications, which has resulted in their current vulnerable state. This project will establish the communications security requirements ....Secure Communications for Critical Infrastructure Control Systems. Control systems are crucial to the nation's critical infrastructure. They supervise and command the remote devices used in the energy distribution, water management, telecommunications, and transport industries. Historically, security has not been a concern in the design of control systems communications, which has resulted in their current vulnerable state. This project will establish the communications security requirements of control systems technologies and propose suitable secure communications schemes. New cryptographic protocols and analytic models will be developed to account for the criticality and operational peculiarities of control systems communications. These results are of significant potential value to Australia's critical infrastructure protection.Read moreRead less
Enabling Anonymity and Privacy for Blockchain Technology in a Quantum World. Blockchain is a promising technology in the digital world today. However, existing approaches for enabling blockchain applications, particularly with privacy protection and anonymity, are vulnerable to quantum computer attacks. This project aims to enable novel cryptographic mechanisms together with their cryptographic libraries for protecting blockchain in the quantum world, hence, post-quantum secure blockchain. The e ....Enabling Anonymity and Privacy for Blockchain Technology in a Quantum World. Blockchain is a promising technology in the digital world today. However, existing approaches for enabling blockchain applications, particularly with privacy protection and anonymity, are vulnerable to quantum computer attacks. This project aims to enable novel cryptographic mechanisms together with their cryptographic libraries for protecting blockchain in the quantum world, hence, post-quantum secure blockchain. The expected outcomes of this project include innovative technologies, as well as secure and practical post-quantum protocols for protecting future blockchain applications. This will provide economic and social benefits to Australian industry through the enablement of advanced technologies which are developed in Australia.Read moreRead less
Software Defined Networking: Transforming Emergency Operations. The project aims to improve the effectiveness and efficiency of Australia's emergency operations, for example, bushfire and rescue missions, by providing robust and integrated communications systems for police and the emergency services. Emergency communications systems are currently fragmented by the different technologies, creating disconnected islands of information. The project aims to provide techniques that allow multiple wire ....Software Defined Networking: Transforming Emergency Operations. The project aims to improve the effectiveness and efficiency of Australia's emergency operations, for example, bushfire and rescue missions, by providing robust and integrated communications systems for police and the emergency services. Emergency communications systems are currently fragmented by the different technologies, creating disconnected islands of information. The project aims to provide techniques that allow multiple wireless technologies to communicate seamlessly using modern software-defined networking solutions.Read moreRead less
Tools and models for measuring and predicting growth in internet addressing and routing complexity. We analyse patterns in the allocation and actual use of Internet Protocol version 4 (IPv4) addresses to predict the technical and market pressures for deployment of IPv6. The utilisation models will help evaluate the potential for emerging markets in scarce IPv4 address prefixes to increase costs to the end-users of Australia's future national broadband network.