Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes nove ....Security for Wireless Mobile Ad hoc Networks. Mobile ad hoc networks, a new emerging wireless networking paradigm, poses challenging problems in security, due to its dynamic nature and lack of centralised infrastructure, for which no adequate solutions exist today. This research addresses theory and design of secure mobile ad hoc networks. It achieves conceptual advances in terms of new security models for distributed location management, mobile authentication and multicasting; it proposes novel dynamic group key management and denial of service protection schemes, develops new security mechanisms for ad hoc routing, provides new insights into formal reasoning of security and demonstrates and evaluates practical secure wireless mobile applications.Read moreRead less
Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract Do ....Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract DoS, propose a new technique to identify malicious packets in the Internet to handle distributed DoS, consider a new approach using smart packets and develop enhancements to intrusion detection systems using data mining. Proposed techniques are analysed in practical situations.Read moreRead less
Software Defined Networking: Transforming Emergency Operations. The project aims to improve the effectiveness and efficiency of Australia's emergency operations, for example, bushfire and rescue missions, by providing robust and integrated communications systems for police and the emergency services. Emergency communications systems are currently fragmented by the different technologies, creating disconnected islands of information. The project aims to provide techniques that allow multiple wire ....Software Defined Networking: Transforming Emergency Operations. The project aims to improve the effectiveness and efficiency of Australia's emergency operations, for example, bushfire and rescue missions, by providing robust and integrated communications systems for police and the emergency services. Emergency communications systems are currently fragmented by the different technologies, creating disconnected islands of information. The project aims to provide techniques that allow multiple wireless technologies to communicate seamlessly using modern software-defined networking solutions.Read moreRead less
Autoconfiguration of critical network infrastructure. In 2000, Vitek Boden hacked into Maroochy Shire's sewerage system, causing hundreds of kilolitres of raw sewage to flow into a public area, causing financial and environmental damage, and the potential for the spread of life-threatening disease. The goal of this project is to improve the security of Australia's critical infrastructure, for instance, electricity and water supply. The project’s approach is to simplify the critical bottlenecks i ....Autoconfiguration of critical network infrastructure. In 2000, Vitek Boden hacked into Maroochy Shire's sewerage system, causing hundreds of kilolitres of raw sewage to flow into a public area, causing financial and environmental damage, and the potential for the spread of life-threatening disease. The goal of this project is to improve the security of Australia's critical infrastructure, for instance, electricity and water supply. The project’s approach is to simplify the critical bottlenecks in communication between plant equipment and company management, namely, the firewall that protects the critical plant equipment from viruses and hackers. Simplification will improve transparency and hence reduce the possibility that security holes allow an incident similar to that of this incident, or worse.Read moreRead less
Real-time internet of thing algorithms with performance guarantees. This project aims to provide efficient, distributed resource allocation algorithms that can perform satisfactorily within time limits imposed by real-time systems. Real-time Internet of Things (IoT) devices will play a significant role in future transport technologies, such as autonomous vehicles and smart traffic management, and will place significant demands upon distributed computing systems to provide timely information upda ....Real-time internet of thing algorithms with performance guarantees. This project aims to provide efficient, distributed resource allocation algorithms that can perform satisfactorily within time limits imposed by real-time systems. Real-time Internet of Things (IoT) devices will play a significant role in future transport technologies, such as autonomous vehicles and smart traffic management, and will place significant demands upon distributed computing systems to provide timely information updates. The computing challenge is to provide reliable, accurate and timely information to IoT devices. The outcomes of this project will directly be beneficial to a variety of IoT applications in transportation, autonomous vehicles, and smart cities. The valuable engineering insights and novel algorithms will support industry, government, and practitioners for future real-time IoT design and deployments.Read moreRead less
Tools and models for measuring and predicting growth in internet addressing and routing complexity. We analyse patterns in the allocation and actual use of Internet Protocol version 4 (IPv4) addresses to predict the technical and market pressures for deployment of IPv6. The utilisation models will help evaluate the potential for emerging markets in scarce IPv4 address prefixes to increase costs to the end-users of Australia's future national broadband network.
Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level arch ....Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level architecture of the solution.Read moreRead less
Large-scale highly dynamic wireless networks: architecture and communication strategies design. This project will develop novel techniques for the modelling, design and management of highly dynamic networks, with wireless vehicular networks for autonomous vehicles being a typical but not sole example. Social and economical benefits are expected in the areas of road traffic management and road safety, communication and environment protection.
Internet traffic-matrix synthesis. This project will enhance research and development in Internet engineering by providing basic inputs to test and validate new ideas. The result will be a more efficient, reliable, and robust Internet.
Development of a new transport layer protocol to provide secure broadband internet connections via satellite to rural and remote areas. Satellite links form an essential part of broadband connectivity to rural and remote areas. Effective use of the internet over satellite links is therefore essential if B2B (Business-to-Business) and B2C (Business-to-Consumer) E-commerce is to develop in these areas. In many application networks, particularly virtual private networks (VPN), secure transmission ....Development of a new transport layer protocol to provide secure broadband internet connections via satellite to rural and remote areas. Satellite links form an essential part of broadband connectivity to rural and remote areas. Effective use of the internet over satellite links is therefore essential if B2B (Business-to-Business) and B2C (Business-to-Consumer) E-commerce is to develop in these areas. In many application networks, particularly virtual private networks (VPN), secure transmission is important to avoid fraud and maintain privacy.
Satellite links introduce a long delay (latency) in the transmission path and existing secure internet protocols do not handle this well. This is because in many situations, it is a requirement that the secure connection be implemented not only independently of the
satellite service provider but also in a reliable and efficient way.
This project will develop new practical solutions so that secure and reliable end-to-end connections can be provided over the satellite links.
Read moreRead less