- IPv6, Mobility, Handover, Networks, Security
- Wireless Body Area Networks
- Mobile Ad Hoc Networks
- Mobile Agent-Based Network Management
- User Authentication and Security Systems
- Energy Efficient Wireless Sensor Networks
- Advanced Authentication Protocols Security
- Security in Wireless Sensor Networks
- Cooperative Communication and Network Coding
- Opportunistic and Delay-Tolerant Networks
- Vehicular Ad Hoc Networks (VANETs)
- Network Security and Intrusion Detection
- Biometric Identification and Security
- Advanced MIMO Systems Optimization
- Access Control and Trust
- Wireless Networks and Protocols
- Data Visualization and Analytics
- Age of Information Optimization
- Smart Grid Security and Resilience
- Advanced Wireless Network Optimization
- IoT and Edge/Fog Computing
- Anomaly Detection Techniques and Applications
- Power Line Communications and Noise
- Peer-to-Peer Network Technologies
- Network Traffic and Congestion Control
Macquarie University
2014-2023
University of East London
2022
Wayne State University
2022
University of Warwick
2022
Western Sydney University
1997-2013
The University of Sydney
2002
Western University
2002
Information Technology University
1999
Nepean Hospital
1997
Different from the traditional device-to-device (D2D) communication, vehicle-to-everything (V2X) communication is characterized by high mobility of vehicles, which introduces fast variations channel state information (CSI) such that accurate CSI difficult to be obtained. Unlike other previous work focuses on perfect CSI, in this article, we investigate joint power control and resource allocation problem for D2D-based V2X a more practical case where imperfect. We aim at maximizing sum ergodic...
Generating random binary sequences (BSes) is a fundamental requirement in cryptography. A BS sequence of $N$ bits, and each bit has value 0 or 1. For securing sensors within wireless body area networks (WBANs), electrocardiogram (ECG)-based generation methods have been widely investigated which interpulse intervals (IPIs) from heartbeat cycle are processed to produce BSes. Using these IPI-based generate 128-bit real time normally takes around half minute. In order improve the efficiency such...
Safety-related vehicle-to-everything (V2X) communication plays an essential role in road safety and requires stringent high reliability low latency. In this paper, we propose a novel approach of joint power control resource allocation mode selection to solve the problem mixed centralized/distributed V2X system under different network load conditions. Two major modes are considered for communication: scheduled (centralized system) UE autonomous (distributed system). order meet specific...
As an emerging paradigm, device-to-device (D2D) communication has the capability to complement and enhance conventional cellular network by offering high spectral energy efficiency. However, problem of cochannel interference makes resource allocation very complex challenging in underlay D2D networks. This paper proposes a novel joint power control scheduling scheme both throughput users' fairness Unlike other previous work this area, our aims at maximizing sum all proportional functions,...
We present an electrocardiogram (ECG)-based data encryption (EDE) scheme for implantable medical devices (IMDs). IMDs, including pacemakers and cardiac defibrillators, perform therapeutic or even life-saving functions store sensitive data; therefore, it is important to prevent adversaries from having access them. The EDE designed with the ability provide information-theoretically unbreakable where two well-known techniques of classic one-time pads (OTPs) error correcting codes are combined...
Any proposal to provide security for implantable medical devices (IMDs), such as cardiac pacemakers and defibrillators, has achieve a trade-off between accessibility doctors gain access an IMD, especially in emergency scenario. In this paper, we propose finger-to-heart (F2H) IMD authentication scheme address accessibility. This utilizes patient's fingerprint perform gaining the IMD. Doctors can treatment by scanning finger tip instead of asking patient passwords/security tokens, thereby,...
Security and trust are fundamental challenges when it comes to the deployment of large wireless sensor networks. In this paper, we propose a novel hierarchical management scheme that minimizes communication storage overheads. Our takes into account direct indirect (group) in evaluation as well energy associated with nodes service selection. It also considers dynamic aspect by introducing varying function which could give greater weight most recently obtained values calculation. The proposed...
Sensor networks are increasingly being used in the development and application of military surveillance systems. Small size battery-powered sensor devices deployed unattended hostile environments, such as battlefields to detect any physical intrusion. Energy efficiency, coverage, connectivity three major quality-of-service requirements mission critical applications. Energy-efficient communication is required prolong network lifetime. Better coverage intrusion attempts all kinds. Similarly,...
Wearable and implantable medical devices (WIMDs) perform critical health monitoring therapeutic functions. However, current WIMD products lack security safeguards to protect patients from fatal cyber attacks. In the recent past, electrocardiogram (ECG) signals-based techniques have been widely explored secure such by using two cryptographic primitives, fuzzy commitment vault, respectively. Nonetheless, differences, as well similarities between these not investigated, making it difficult...
In this paper, we present a trust establishment and management framework for hierarchical wireless sensor networks. The network architecture consider consists of collection nodes, cluster heads base station arranged hierarchically. encompasses schemes establishing managing between these different entities. We demonstrate that the proposed helps to minimize memory, computation communication overheads involved in Our takes into account direct indirect (group) evaluation as well energy...
The security of wireless communication module for Implantable Medical Devices (IMDs) poses a unique challenge that doctors in any qualified hospital should have the access to IMDs an emergency treatment while IMD be protected from adversaries during patient's daily life. In this paper, we present non-key based scheme IMDs, named BodyDouble. This employs external authentication proxy embedded gateway authenticate identity programmer. here transmitting antenna send data and jamming signals....
Healthcare sectors are increasingly facing cyber security challenges and threats from adversaries due to numerous flaws the lack of safeguards in medical devices. Among these devices systems, issues that concern implantable (IMDs) have attracted attention both academia industry. In this paper, we discuss vulnerabilities current IMD products by presenting tests demonstrations performed researchers. Based on this, three critical trade-offs design analyzed, namely vs. accessibility emergencies,...
Recent advances in wireless technologies have led to an increased deployment of Wireless Sensor Networks (WSNs) for a plethora diverse surveillance applications such as health, military, and environmental. However, sensor nodes WSNs usually suffer from short device lifetime due severe energy constraints therefore, cannot guarantee meet the Quality Service (QoS) needs various applications. This is proving be major hindrance widespread adoption Therefore, extend WSNs, it critical optimize...
Node scheduling provides an effective way to prolong the network lifetime of Internet-of-Things (IoT) networks comprising energy-constrained sensor nodes. Barrier is a special type node scheme that targets IoT-based surveillance applications. An efficient barrier must address key Quality-of-Service (QoS) requirements smart applications, such as coverage, connectivity, and energy efficiency. Moreover, be capable dynamically adapting its execution strategy in event failures caused due faults...
The security issue of wireless Implantable Medical Devices (IMD) is an emerging area research. unique challenge here that IMD should be accessed by doctors with no authorization for emergency treatments while it still has to protected from adversaries. In this paper, we propose a novel ECG-based Secret Data Sharing (ESDS) scheme in order protect the data privacy against eavesdropping and other active attacks establishes secure channel wherein secret encrypted random ECG bit string generated...
Wireless Implantable Medical Devices (IMDs), including pacemakers and cardiac defibrillators, often have built-in wireless modules in order to facilitate non-invasive programming data read-out; however, most IMDs lack a security mechanism. The unique challenge is that should be able accessed by doctors at any legitimate hospital for emergency purposes, but conventional mechanisms using keys or credentials cannot guarantee could obtain timely situations. To address this challenge, we present...
Mobile ad hoc networks (MANETs) are self-organizing and adaptive, securing such is non-trivial. Most security schemes suggested for MANETs tend to build upon some fundamental assumptions regarding the trustworthiness of participating hosts underlying networking systems without presenting any definite scheme trust establishment. If MANET achieve same level acceptance as traditional wired wireless network, then a formal specification framework management must become an intrinsic part its...
As defined by IEEE 802.15.6 standard, channel sharing is a potential method to coordinate inter-network interference among Medical Body Area Networks (MBANs) that are close one another. However, opens up new vulnerabilities as selfish MBANs may manipulate their online requests gain unfair advantage over others. In this paper, we address issue proposing truthful algorithm and companion protocol allocates efficiently truthfully punishing for misreporting request parameters such time, duration...
With the unprecedented demand of location-based services in indoor scenarios, wireless localization is emerging as an essential application for mobile users. While line-of-sight GPS signal not available at spaces, WiFi fingerprinting using received strength (RSS) has become popular with its ubiquitous accessibility. Although data can be easily collected by portable devices, to achieve robust and efficient remains challenging two constraints. First, accuracy will degraded random fluctuation...
Barrier coverage scheduling is an energy conservation scheme in which a subset of sensor nodes with overlapped sensing area (also called barrier) activated to meet the key Quality Service (QoS) requirements such as energy-efficiency, coverage, and connectivity. However, sudden unexpected node failures barrier due security attacks Denial (DoS) poses challenge for maintaining desired QoS levels. In this paper, we propose secure SEC <sup xmlns:mml="http://www.w3.org/1998/Math/MathML"...