Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Engineering

Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli Jan 2018

Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli

Research outputs 2014 to 2021

Biometric security has found many applications in Internet of Things (IoT) security. Many mobile devices including smart phones have supplied fingerprint authentication function. However, the authentication performance in such restricted environment has been downgraded significantly. A number of methods based on Delaunay triangulation have been proposed for minutiae-based fingerprint matching, due to some favorable properties of the Delaunay triangulation under image distortion. However, all existing methods are based on 2D pattern, of which each unit, a Delaunay triangle, can only provide limited discrimination ability and could cause low matching performance. In this paper, we propose a 3D Delaunay triangulation based …


A Novel Privacy Preserving User Identification Approach For Network Traffic, Nathan Clarke, Fudong Li, Steven Furnell Sep 2017

A Novel Privacy Preserving User Identification Approach For Network Traffic, Nathan Clarke, Fudong Li, Steven Furnell

Research outputs 2014 to 2021

The prevalence of the Internet and cloud-based applications, alongside the technological evolution of smartphones, tablets and smartwatches, has resulted in users relying upon network connectivity more than ever before. This results in an increasingly voluminous footprint with respect to the network traffic that is created as a consequence. For network forensic examiners, this traffic represents a vital source of independent evidence in an environment where anti-forensics is increasingly challenging the validity of computer-based forensics. Performing network forensics today largely focuses upon an analysis based upon the Internet Protocol (IP) address – as this is the only characteristic available. More typically, …


Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley Jan 2016

Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley

Research outputs 2014 to 2021

Fiber optic sensors have become a mainstream sensing technology within a large array of applications due to their inherent benefits. They are now used significantly in structural health monitoring, and are an essential solution for monitoring harsh environments. Since their first development over 30 years ago, they have also found promise in security applications. This paper reviews all of the optical fiber-based techniques used in physical intrusion detection systems. It details the different approaches used for sensing, interrogation, and networking, by research groups, attempting to secure both commercial and residential premises from physical security breaches. The advantages and the disadvantages …


Cyber Blackbox For Collecting Network Evidence, Jooyoung Lee, Sunoh Choi, Yangseo Choi, Jonghyun Kim, Ikkyun Kim, Youngseok Lee Jan 2015

Cyber Blackbox For Collecting Network Evidence, Jooyoung Lee, Sunoh Choi, Yangseo Choi, Jonghyun Kim, Ikkyun Kim, Youngseok Lee

Australian Digital Forensics Conference

In recent years, the hottest topics in the security field are related to the advanced and persistent attacks. As an approach to solve this problem, we propose a cyber blackbox which collects and preserves network traffic on a virtual volume based WORM device, called EvidenceLock to ensure data integrity for security and forensic analysis. As a strategy to retain traffic for long enough periods, we introduce a deduplication method. Also this paper includes a study on the network evidence which is collected and preserved for analyzing the cause of cyber incident. Then, a method is proposed to suggest a starting …


Performance Evaluation Of A Technology Independent Security Gateway For Next Generation Networks, Fudong Li, Nathan Clarke, Steven Furnell, Is-Mkwawa Mkwawa Jan 2014

Performance Evaluation Of A Technology Independent Security Gateway For Next Generation Networks, Fudong Li, Nathan Clarke, Steven Furnell, Is-Mkwawa Mkwawa

Research outputs 2014 to 2021

With the all IP based Next Generation Networks being deployed around the world, the use of real-time multimedia service applications is being extended from normal daily communications to emergency situations. However, currently different emergency providers utilise differing networks and different technologies. As such, conversations could be terminated at the setup phase or data could be transmitted in plaintext should incompatibility issues exit between terminals. To this end, a novel security gateway that can provide the necessary security support for incompatible terminals was proposed, developed and implemented to ensure the successful establishment of secure real-time multimedia conversations. A series of experiments …


Cyber Influence, William Hutchinson Dec 2009

Cyber Influence, William Hutchinson

Australian Information Warfare and Security Conference

This paper explores influence in the cyber-world and the ability and effectiveness of influence campaigns in this medium. It examines the possibilities of influence in the online world as examines the potential of mobile technologies in this area. The contentious link between influence and behavioural change is investigated. Counterinfluence in the context of radicalisation is also looked at. Whilst it is inevitable that the digital medium is and will be used for influence campaigns and will be influential regardless if there are concerted ‘campaigns’ or not, it effects in terms of behavioural change are still open to question.


Safeguarding Australia From Cyber-Terrorism:A Proposed Cyber-Terrorism Scada Risk Framework For Industry Adoption, Christopher Beggs, Matthew Warren Dec 2009

Safeguarding Australia From Cyber-Terrorism:A Proposed Cyber-Terrorism Scada Risk Framework For Industry Adoption, Christopher Beggs, Matthew Warren

Australian Information Warfare and Security Conference

Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, and enhancing cyber-terrorism risk assessment models for SCADA systems. This paper is an extension of work previously published by Beggs and Warren 2008, it presents a high level overview of a cyber-terrorism SCADA risk framework that has been adopted and validated by SCADA industry practitioners. The paper proposes a managerial framework …


Economic Sustainability Of Remote Access Networking Classrooms, C Nuangjamnong, S P. Maj, D Veal Jan 2008

Economic Sustainability Of Remote Access Networking Classrooms, C Nuangjamnong, S P. Maj, D Veal

EDU-COM International Conference

Within the higher education domain, there is a prevalent belief that e-learning, virtual classroom and tele-education are essential requirements for the long-term effectiveness and success of educational institutions. Many information technologies have been adopted to assist studying and learning remotely and are hence potentially beneficial to students, teachers and educational providers. For educational providers, the benefits are that there are no physical or geographical limits to the number of students that can be enrolled in a course of study. However, within the field of network technology, students must actually use network devices during their studies. This is important not only …


Self-Restraint Admission Control For Ad-Hoc Wlans, Hushairi Zen, Daryoush Habibi, Iftekhar Ahmad Jan 2008

Self-Restraint Admission Control For Ad-Hoc Wlans, Hushairi Zen, Daryoush Habibi, Iftekhar Ahmad

Research outputs pre 2011

Admission control is an important mechanism for sustaining throughput and supporting quality of service (QoS) for real-time traffic in a wireless local area network (WLAN). In an adhoc WLAN scenario where no access point (AP) is available, admission control has to be self-managed by each node. We propose a self-restraining admission control mechanism that works by monitoring the congestion level of the network in the adhoc WLAN. Wireless nodes can listen to all nodes within their range and be aware of the collision rates. A node wishing to join the network measures the current collision rate, and predicts the post-admission …


Source Localisation In Wireless Sensor Networks Based On Optimised Maximum Likelihood, Mohammed Rahman, Daryoush Habibi, Iftekhar Ahmad Jan 2008

Source Localisation In Wireless Sensor Networks Based On Optimised Maximum Likelihood, Mohammed Rahman, Daryoush Habibi, Iftekhar Ahmad

Research outputs pre 2011

Maximum likelihood (ML) is a popular and effective estimator for a wide range of diverse applications and currently affords the most accurate estimation for source localisation in wireless sensor networks (WSN). ML however has two major shortcomings namely, that it is a biased estimator and is also highly sensitive to parameter perturbations. An Optimisation to ML (OML) algorithm was introduced that minimises the sum-of-squares bias and exhibits superior performance to ML in statistical estimation, particularly with finite datasets. This paper proposes a new model for acoustic source localisation in WSN, based upon the OML estimation process. In addition to the …


Analysis Of Information Remaining On Hand Held Devices For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland Jan 2008

Analysis Of Information Remaining On Hand Held Devices For Sale On The Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland

Research outputs pre 2011

The ownership and use of mobile phones, Personal Digital Assistants and other hand held devices is now ubiquitous both for home and business use. The majority of these devices have a high initial cost, a relatively short period before they become obsolescent and a relatively low second hand value. As a result of this, when the devices are replaced, there are indications that they tend to be discarded. As technology has continued to develop, it has led to an increasing diversity in the number and type of devices that are available, and the processing power and the storage capacity of …


Converging Voice, Video And Data In Wlan With Qos Support, Hushairi Zen, Daryoush Habibi, Justin Wyatt, Iftekhar Ahmad Jan 2008

Converging Voice, Video And Data In Wlan With Qos Support, Hushairi Zen, Daryoush Habibi, Justin Wyatt, Iftekhar Ahmad

Research outputs pre 2011

Providing quality of service (QoS) for converging traffic in wireless local area network (WLAN) is still a major issue for the researchers and industries. Due to the limited bandwidth and exposure to unpredictable interferences in a wireless environment, efficient management and optimization of the access protocols are essential to provide acceptable QoS for real-time traffic and fairness to best-effort traffic. In this paper, we investigate the throughput and delay performance of the legacy IEEE 802.11 and the 802.11e when carrying converging data in WLAN. We evaluate our recently proposed protocol known as wireless token network protocol (WTN) and show that …


An Improved Fec Scheme For Mobile Wireless Communication At Vehicular Speeds, Iftekhar Ahmad, Daryoush Habibi, Ziaur Rahman Jan 2008

An Improved Fec Scheme For Mobile Wireless Communication At Vehicular Speeds, Iftekhar Ahmad, Daryoush Habibi, Ziaur Rahman

Research outputs pre 2011

WiMAX has emerged as a promising wireless communication technology with potential to deliver high throughput and guaranteed quality of service to the end applications. Recent studies suggest that while WiMAX (802.16e) is capable of delivering a data rate of up to 75 Mbps for fixed wireless communications, data rate decreases drastically for mobile wireless communications, often providing a data rate less than 1 Mb/s when the mobile nodes travel at vehicular speeds. High bit error rate caused at high vehicular speeds is the key reason for low throughput. In noisy mobile communication environments, standard error control mechanisms like the transmission …


Performance Evaluation Of Ieee 802.15.4 For Mobile Sensor Network, Kartinah Zen, Daryoush Habibi, Alexander Rassau, Iftekhar Ahmad Jan 2008

Performance Evaluation Of Ieee 802.15.4 For Mobile Sensor Network, Kartinah Zen, Daryoush Habibi, Alexander Rassau, Iftekhar Ahmad

Research outputs pre 2011

The IEEE 802.15.4 standard medium access control (MAC) protocol for low rate wireless personal area networks (LRWPAN) is design mainly for static sensor networks and its capability to support mobile sensor networks has not yet been established. To the best knowledge of authors, this is the first paper that evaluates the suitability of IEEE 802.15.4 MAC in mobile sensor networks environment. We evaluate the performance based on node's speed and beacon order, and observe the effect on energy usage, packet delivery ratio and time required to associate with its coordinator. From the experiment we observe that the moving nodes experienced …


Improving Mobile Sensor Connectivity Time In The Ieee 802.15.4 Networks, Kartinah Zen, Daryoush Habibi, Iftekhar Ahmad Jan 2008

Improving Mobile Sensor Connectivity Time In The Ieee 802.15.4 Networks, Kartinah Zen, Daryoush Habibi, Iftekhar Ahmad

Research outputs pre 2011

In the IEEE 802.15.4 medium access control (MAC) protocol for wireless sensor networks, a sensor node needs to associate with a coordinator before it starts sending or receiving data. The sensor node will mostly choose the nearest coordinator to associate with. However, this method is not suitable for a constantly moving sensor node because it will end up switching coordinators too often due to short connectivity time. The IEEE 802.15.4 has a simplistic and inadequate method of choosing a coordinator in this context. In this paper, we introduce a method to increase the mobile sensor node connectivity time with its …


Use Of The Wfg Toolkit And Pisa For Comparison Of Moeas, Lucas Bradstreet, Luigi Barone, Lyndon While, Simon Huband, Philip Hingston Jan 2007

Use Of The Wfg Toolkit And Pisa For Comparison Of Moeas, Lucas Bradstreet, Luigi Barone, Lyndon While, Simon Huband, Philip Hingston

Research outputs pre 2011

Understanding the behaviour of different optimisation algorithms is important in order to apply the best algorithm to a particular problem. The WFG toolkit was designed to aid this task for multi-objective evolutionary algorithms (MOEAs), offering an easily modifiable framework that allows practitioners the ability to test different features by "plugging" in different forms of transformations. In doing so, the WFG toolkit provides a set of problems that exhibit a variety of different characteristics. This paper presents a comparison between two state of the art MOEAs (NSGA-II and SPEA2) that exemplifies the unique capabilities of the WFG toolkit. By altering the …


Passive And Active Optical Bit-Pattern Recognition Structures For Multiwavelength Optical Packet Switching Networks, Muhsen Aljada, Kamal Alameh Jan 2007

Passive And Active Optical Bit-Pattern Recognition Structures For Multiwavelength Optical Packet Switching Networks, Muhsen Aljada, Kamal Alameh

Research outputs pre 2011

Next generation High-Speed optical packet switching networks require components capable of recognising the optical header to enable on-the-fly accurate switching of incoming data packets to their destinations. This paper experimentally demonstrates a comparison between two different optical header recognition structures; A passive structure based on the use of Fiber Bragg Gratings (FBGs), whereas the active structure employs Opto-VLSI processors that synthesise dynamic wavelength profile through digital phase holograms. The structures are experimentally demonstrated at 10Gbps. Performance comparison between the two structures is also discussed. These optical header recognition structures are attractive for multiwavelength optical network and applications.