Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes nove ....Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes novel dynamic group key management and denial of service protection schemes, develops new security mechanisms for ad hoc routing, provides new insights into formal reasoning of security and demonstrates and evaluates practical secure wireless mobile applications.Read moreRead less
Special Research Initiatives - Grant ID: SR0354880
Funder
Australian Research Council
Funding Amount
$10,000.00
Summary
Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national intere ....Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national interest. It will do so by bringing together for the first time, academic, government and business people from a vast array of backgrounds, and whose interests lie across a spectrum of commercial, legal, policy and research outcomes.Read moreRead less
Hardware Implementation Strategies for JPEG 2000. JPEG2000 is a new image compression standard, which is expected to become the dominant format for image communications over the internet and then make inroads into consumer peripheral devices, including digital cameras, printers and scanners. The standard is fundamentally different from and much more complex than its well-known predecessor, JPEG, and there are currently no published hardware implementations. The aim of this project is to investig ....Hardware Implementation Strategies for JPEG 2000. JPEG2000 is a new image compression standard, which is expected to become the dominant format for image communications over the internet and then make inroads into consumer peripheral devices, including digital cameras, printers and scanners. The standard is fundamentally different from and much more complex than its well-known predecessor, JPEG, and there are currently no published hardware implementations. The aim of this project is to investigate a wide range of potential implementation strategies to identify those which are able to minimize the consumption of various resources, including memory consumption, memory bandwidth, chip area and processing latency.Read moreRead less