Skip to main content

Research Repository

Advanced Search

Outputs (24)

A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node (2021)
Journal Article
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2021). A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node. Wireless Networks, 27(5), 3423-3439. https://doi.org/10.1007/s11276-021-02580-8

Utilising the mobilisation of a sink node in a wireless sensor network to combat the energy hole, or hotspot issue, is well referenced. However, another issue , that of energy spikes may remain. With the mobile sink node potentially communicating wit... Read More about A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node.

A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network (2020)
Presentation / Conference Contribution
Thomson, C., Wadhaj, I., Al-Dubai, A., & Tan, Z. (2020, April). A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network. Presented at IEEE 6th World Forum on Internet of Things, New Orleans, Louisiana, USA

The issue of energy holes, or hotspots, in wireless sensor networks is well referenced. As is the proposed mobilisa-tion of the sink node in order to combat this. However, as the sink node shall still pass some nodes more closely and frequently than... Read More about A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network.

A Novel Cost Optimization Strategy for SDN-Enabled UAV-Assisted Vehicular Computation Offloading (2020)
Journal Article
Zhao, L., Yang, K., Tan, Z., Li, X., Sharma, S., & Liu, Z. (2021). A Novel Cost Optimization Strategy for SDN-Enabled UAV-Assisted Vehicular Computation Offloading. IEEE Transactions on Intelligent Transportation Systems, 22(6), 3664-3674. https://doi.org/10.1109/TITS.2020.3024186

Vehicular computation offloading is a well-received strategy to execute delay-sensitive and/or compute-intensive tasks of legacy vehicles. The response time of vehicular computation offloading can be shortened by using mobile edge computing that offe... Read More about A Novel Cost Optimization Strategy for SDN-Enabled UAV-Assisted Vehicular Computation Offloading.

FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment (2020)
Journal Article
Zhang, S., Liu, Y., Li, S., Tan, Z., Zhao, X., & Zhou, J. (2020). FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment. IEEE Access, 8, 17356-17365. https://doi.org/10.1109/access.2020.2966399

Edge computing is a research hotspot that extends cloud computing to the edge of the network. Due to the recent developments in computation, storage and network technology for end devices, edge networks have become more powerful, making it possible t... Read More about FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment.

FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks (2020)
Journal Article
Lai, S., Fan, X., Ye, Q., Tan, Z., Zhang, Y., He, X., & Nanda, P. (2020). FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks. IEEE Access, 8, 13516-13526. https://doi.org/10.1109/access.2020.2965562

Mobile cloud computing has emerged as a promising paradigm to facilitate computation-intensive and delay-sensitive mobile applications. Computation offloading services at the edge mobile cloud environment are provided by small-scale cloud infrastruct... Read More about FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks.

PTAOD: A Novel Framework For Supporting Approximate Outlier Detection over Streaming Data for Edge Computing (2019)
Journal Article
Zhu, R., Yu, T., Tan, Z., Du, W., Zhao, L., Li, J., & Xia, X. (2020). PTAOD: A Novel Framework For Supporting Approximate Outlier Detection over Streaming Data for Edge Computing. IEEE Access, 8, 1475-1485. https://doi.org/10.1109/ACCESS.2019.2962066

Outlier detection over sliding window is a fundamental problem in the domain of streaming data management, which has been studied over 10 years. The key of supporting outlier detection is to construct a neighbour-list for each object. It is used for... Read More about PTAOD: A Novel Framework For Supporting Approximate Outlier Detection over Streaming Data for Edge Computing.

PFARS: Enhancing Throughput and Lifetime of Heterogeneous WSNs through Power-aware Fusion, Aggregation and Routing Scheme (2019)
Journal Article
Khan, R., Zakarya, M., Tan, Z., Usman, M., Jan, M. A., & Khan, M. (2019). PFARS: Enhancing Throughput and Lifetime of Heterogeneous WSNs through Power-aware Fusion, Aggregation and Routing Scheme. International Journal of Communication Systems, 32(18), Article e4144. https://doi.org/10.1002/dac.4144

Heterogeneous wireless sensor networks (WSNs) consist of resource-starving nodes that face a challenging task of handling various issues such as data redundancy, data fusion, congestion control, and energy efficiency. In these networks, data fusion a... Read More about PFARS: Enhancing Throughput and Lifetime of Heterogeneous WSNs through Power-aware Fusion, Aggregation and Routing Scheme.

A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking (2019)
Presentation / Conference Contribution
Zhao, L., Liu, Y., Al-Dubai, A., Tan, Z., Min, G., & Xu, L. (2019, August). A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking. Presented at The 21st IEEE International Conference on High Performance Computing and Communications, Zhangjiajie, Hunan, China

With the rapid development of mobile applications, networking technologies have been constantly evolved to offer a more convenient way of sharing information and online-communication anytime and anywhere. Vehicular networks have the potential to beco... Read More about A Learning-based Vehicle-Trajectory Generation Method for Vehicular Networking.

A 3D Smooth Random Walk Mobility Model for FANETs (2019)
Presentation / Conference Contribution
Lin, N., Gao, F., Zhao, L., Al-Dubai, A., & Tan, Z. (2019, August). A 3D Smooth Random Walk Mobility Model for FANETs. Presented at The 21 IEEE High Performance Computing and Communications (HPCC), Zhangjiajie, Hunan, China

The number of Unmanned Aerial Vehicles (UAVs) applications has increased over the past few years. Among all scenarios, UAV group consisting multi-UAVs is normally used to provide extensible communications. As a networking solution, Flying Ad Hoc Netw... Read More about A 3D Smooth Random Walk Mobility Model for FANETs.

Decrypting Live SSH Traffic in Virtual Environments (2019)
Journal Article
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019). Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010

Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts required for decrypting secure communications. This paper develops the MemDe-... Read More about Decrypting Live SSH Traffic in Virtual Environments.

Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors (2018)
Journal Article
Lenka, R. K., Rath, A. K., Tan, Z., Sharma, S., Puthal, D., Simha, N. V. R., Prasad, M., Raja, R., & Tripathi, S. S. (2018). Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors. IEEE Access, 6, 30162-30173. https://doi.org/10.1109/ACCESS.2018.2842760

Wireless Sensors are an important component to develop the Internet of Things (IoT) Sensing infrastructure. There are enormous numbers of sensors connected with each other to form a network (well known as wireless sensor networks) to complete IoT Inf... Read More about Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors.

Moving Towards Highly Reliable and Effective Sensor Networks. (2018)
Journal Article
Ahmad, M., Tan, Z., He, X., & Ni, W. (2018). Moving Towards Highly Reliable and Effective Sensor Networks. Ad-hoc & sensor wireless networks, 40(3-4), 163-168

Wireless Sensor Networks (WSNs) have been the preferred choice for the design and deployment of next generation monitoring and control systems [1]. In these networks, the sensor nodes forward their sensed data towards a centralized base station. The... Read More about Moving Towards Highly Reliable and Effective Sensor Networks..

Security for Cyber-Physical Systems in Healthcare (2017)
Book Chapter
Saleem, K., Tan, Z., & Buchanan, W. (2017). Security for Cyber-Physical Systems in Healthcare. In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (233-251). Springer. https://doi.org/10.1007/978-3-319-47617-9_12

The great leap forward of cyber-physical systems has made provision for future personalized medicine. However, these systems are prone to cyber attacks. To provide patients with secure and reliable healthcare experience, the security issues of cyber-... Read More about Security for Cyber-Physical Systems in Healthcare.

Hybrid Tree-rule Firewall for High Speed Data Transmission (2016)
Journal Article
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016). Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE Transactions on Cloud Computing, 1-1. https://doi.org/10.1109/tcc.2016.2554548

Traditional firewalls employ listed rules in both configuration and process phases to regulate network traffic. However, configuring a firewall with listed rules may create rule conflicts, and slows down the firewall. To overcome this problem, we hav... Read More about Hybrid Tree-rule Firewall for High Speed Data Transmission.

Intrusion detection method based on nonlinear correlation measure (2014)
Journal Article
Ambusaidi, M. A., Tan, Z., He, X., Nanda, P., Lu, L. F., & Jamdagni, A. (2014). Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology, 8(2/3), 77. https://doi.org/10.1504/ijipt.2014.066377

Cyber crimes and malicious network activities have posed serious threats to the entire internet and its users. This issue is becoming more critical, as network-based services, are more widespread and closely related to our daily life. Thus, it has ra... Read More about Intrusion detection method based on nonlinear correlation measure.

Detection of Denial-of-Service Attacks Based on Computer Vision Techniques (2014)
Journal Article
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015). Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218

Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing approaches based on machine learning and statistical analysis, the proposed... Read More about Detection of Denial-of-Service Attacks Based on Computer Vision Techniques.

A Novel Feature Selection Approach for Intrusion Detection Data Classification (2014)
Presentation / Conference Contribution
Ambusaidi, M. A., He, X., Tan, Z., Nanda, P., Lu, L. F., & Nagar, U. T. (2014, September). A Novel Feature Selection Approach for Intrusion Detection Data Classification. Presented at 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications

Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing daily activities occurring in computer systems to detect occurrences of security threats. However, the routinely produced analytical data from computer networks ar... Read More about A Novel Feature Selection Approach for Intrusion Detection Data Classification.

A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment (2014)
Presentation / Conference Contribution
Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014, September). A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. Presented at 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications

The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovative concept enables a physical device to represent itself in the digital wo... Read More about A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment.

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning (2014)
Presentation / Conference Contribution
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2014, September). Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. Presented at 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications

The goal of email classification is to classify user emails into spam and legitimate ones. Many supervised learning algorithms have been invented in this domain to accomplish the task, and these algorithms require a large number of labeled training d... Read More about Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning.

A Stateful Mechanism for the Tree-Rule Firewall (2014)
Presentation / Conference Contribution
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2014, September). A Stateful Mechanism for the Tree-Rule Firewall. Presented at 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications

In this paper, we propose a novel connection tracking mechanism for Tree-rule firewall which essentially organizes firewall rules in a designated Tree structure. A new firewall model based on the proposed connection tracking mechanism is then develop... Read More about A Stateful Mechanism for the Tree-Rule Firewall.