A Spatially-Aware RFID-enhanced Sensor Network. Using radio frequency identity (RFID) tags to revolutionise sensor network technologies has the potential to have wide ranging impacts on many of Australia's key industries, including precision agriculture, health care and habitat monitoring (e.g., bush fires).
This fundamental research will create a new type of communication network that will have tremendous impact by allowing monitoring and tracking technologies to be deployed over large, infr ....A Spatially-Aware RFID-enhanced Sensor Network. Using radio frequency identity (RFID) tags to revolutionise sensor network technologies has the potential to have wide ranging impacts on many of Australia's key industries, including precision agriculture, health care and habitat monitoring (e.g., bush fires).
This fundamental research will create a new type of communication network that will have tremendous impact by allowing monitoring and tracking technologies to be deployed over large, infrastructure-free areas at nominal cost. By contributing to the solution of the cost and complexity problems that limit practical deployment of sensor networks, we hope help Australia become a global leader in realizing real-world benefits from information communication technologies.Read moreRead less
Control protocols for wireless networks. There is tremendous commercial potential in the development of wireless multi-hop and sensor networks. This project will help realize such networks, with commercial benefits for the network providers, and the customers that use them (low cost networking). Particular outcomes targeted for Australian needs include: 1) protocols allowing advanced telecommunications services to cover greater geographic areas with less infrastructure 2) improved reliability o ....Control protocols for wireless networks. There is tremendous commercial potential in the development of wireless multi-hop and sensor networks. This project will help realize such networks, with commercial benefits for the network providers, and the customers that use them (low cost networking). Particular outcomes targeted for Australian needs include: 1) protocols allowing advanced telecommunications services to cover greater geographic areas with less infrastructure 2) improved reliability of local communication services in remote or rugged areas 3) protocols for sensor networks, allowing remote monitoring and control of many environmental factors. Read moreRead less
Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes nove ....Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes novel dynamic group key management and denial of service protection schemes, develops new security mechanisms for ad hoc routing, provides new insights into formal reasoning of security and demonstrates and evaluates practical secure wireless mobile applications.Read moreRead less
C4 - Open Services Architecture. The Internet has seen tremendous growth both in terms of usage and supporting infrastructure. This has resulted in new design problems, due to the heterogeneity of applications, networks, devices and the profile of the user population. The proposed solutions only address problems in isolation, and as a result stifle usability and deployment of the services that can be provided. This project aims to design an open services architecture that will overcome the probl ....C4 - Open Services Architecture. The Internet has seen tremendous growth both in terms of usage and supporting infrastructure. This has resulted in new design problems, due to the heterogeneity of applications, networks, devices and the profile of the user population. The proposed solutions only address problems in isolation, and as a result stifle usability and deployment of the services that can be provided. This project aims to design an open services architecture that will overcome the problems in a integrated fashion and enable the creation network support functions that can be used together and can be incrementally deployed to provide service any-time anywhere seamlessly.Read moreRead less
Overseeing the internet: new paradigms of network measurement. Like the electricity network, the internet is a core infrastructure, and so must be reliable and efficient. A gap in bandwidth supply is like a blackout in terms of lost business and productivity. This project will provide the measurement breakthroughs to ensure that network behaviour can be accurately and comprehensively monitored.
Overseeing the internet: new paradigms of network measurement. Like the electricity network, the Internet is a core infrastructure, and so must be reliable, efficient, and fairly accessible. A gap in bandwidth supply is like a blackout in terms of lost business and productivity. Inefficiency increases costs as more equipment is needed for the same service, and an inability to police network providers distorts economics and strangles access to the best services. Network health can only be assesse ....Overseeing the internet: new paradigms of network measurement. Like the electricity network, the Internet is a core infrastructure, and so must be reliable, efficient, and fairly accessible. A gap in bandwidth supply is like a blackout in terms of lost business and productivity. Inefficiency increases costs as more equipment is needed for the same service, and an inability to police network providers distorts economics and strangles access to the best services. Network health can only be assessed through measurements, however, current methods are incapable of measuring some of the most important metrics, for instance whether a provider is conforming to its contract. This project will provide the breakthroughs necessary to ensure that network behaviour can be accurately and comprehensively assessed.Read moreRead less
Enabling Reliable, Efficient, and Secure Networks: Next Generation Measurement for the Internet. Like the electricity network, the Internet is a core infrastructure connecting society, and so must be reliable, efficient, and secure. A gap in bandwidth supply is like a blackout in terms of lost business, productivity and essential data. Inefficiency increases costs as more equipment is needed for the same service, and poor security threatens both the economic and personal spheres, limiting free ....Enabling Reliable, Efficient, and Secure Networks: Next Generation Measurement for the Internet. Like the electricity network, the Internet is a core infrastructure connecting society, and so must be reliable, efficient, and secure. A gap in bandwidth supply is like a blackout in terms of lost business, productivity and essential data. Inefficiency increases costs as more equipment is needed for the same service, and poor security threatens both the economic and personal spheres, limiting freedom and adding cost. A raw material of network health and security is network measurements showing what is going on. However, current methods cannot cope with the size and speed of today's Internet. This project will provide the measurement breakthroughs necessary to ensure that networks are reliable, secure, and fairly priced.Read moreRead less
Algorithmics for Extremely Mobile Wireless Networks. Existing wireless network protocols need stringent conditions to be effective. These conditions are rarely met for concrete applications such as Defence, Disaster-Relief, Search-and-Rescue. All these cannot rely on existing infrastructure, and often require high mobility. This is crucial in the case of Australia which cannot rely on complete network coverage of its lands and seas. This project will develop new wireless protocols for applicati ....Algorithmics for Extremely Mobile Wireless Networks. Existing wireless network protocols need stringent conditions to be effective. These conditions are rarely met for concrete applications such as Defence, Disaster-Relief, Search-and-Rescue. All these cannot rely on existing infrastructure, and often require high mobility. This is crucial in the case of Australia which cannot rely on complete network coverage of its lands and seas. This project will develop new wireless protocols for applications requiring extreme mobility. It will increase Australia's control of this, now ubiquitous, technology thus rendering Australia a key player in this field.Read moreRead less
Anticipatory, Adaptive, and Scalable Mobility Infrastructure for On-board Information Access. The recent advances in wireless technologies are offering new opportunities for ubiquitous information access in on-board mobile computing. Realising an effective on-board mobile computing infrastructure poses significant technical challenges at both application and data transport layers. Our approach features the integration of techniques from satellite communications, anticipatory transport protocols ....Anticipatory, Adaptive, and Scalable Mobility Infrastructure for On-board Information Access. The recent advances in wireless technologies are offering new opportunities for ubiquitous information access in on-board mobile computing. Realising an effective on-board mobile computing infrastructure poses significant technical challenges at both application and data transport layers. Our approach features the integration of techniques from satellite communications, anticipatory transport protocols, and personalised data management systems. The final outcome will be generic techniques and concepts for effective and efficient on-board access to global information sources and services (e.g., weather information, stock quotes, and infotainment). These concepts and techniques will have wider application scope, such as aeronautical, maritime and terrestrial public transport systems.Read moreRead less
Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract Do ....Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract DoS, propose a new technique to identify malicious packets in the Internet to handle distributed DoS, consider a new approach using smart packets and develop enhancements to intrusion detection systems using data mining. Proposed techniques are analysed in practical situations.Read moreRead less