Skip to main content

Research Repository

Advanced Search

All Outputs (9)

Digital twins in industry 4.0 cyber security (2024)
Conference Proceeding
Lo, C., Win, T. Y., Rezaeifar, Z., Khan, Z., & Legg, P. (2024). Digital twins in industry 4.0 cyber security. In Proceedings of the IEEE Smart World Congress 2023. https://doi.org/10.1109/swc57546.2023.10449147

The increased adoption of sophisticated Cyber Physical Systems (CPS) in critical infrastructure and various aspects of Industry 4.0 has exposed vulnerabilities stemming from legacy CPS and Industrial Internet of Things (IIoT) devices. The interconnec... Read More about Digital twins in industry 4.0 cyber security.

Triangle area based multivariate correlation analysis for detecting and mitigating cache pollution attacks in named data networking (2021)
Conference Proceeding
Sohail, M., Zheng, Q., Rezaiefar, Z., Khan, M. A., Ullah, R., Tan, X., …Yuan, L. (2021). Triangle area based multivariate correlation analysis for detecting and mitigating cache pollution attacks in named data networking. In 2020 3rd International Conference on Hot Information-Centric Networking (HotICN) (114-121). https://doi.org/10.1109/HotICN50779.2020.9350746

The key feature of NDN is in-network caching that every router has its cache to store data for future use, thus improve the usage of the network bandwidth and reduce the network latency. However, in-network caching increases the security risks - cach... Read More about Triangle area based multivariate correlation analysis for detecting and mitigating cache pollution attacks in named data networking.

A reliable adaptive forwarding approach in named data networking (2019)
Journal Article
Rezaeifar, Z., Wang, J., Oh, H., Lee, S. B., & Hur, J. (2019). A reliable adaptive forwarding approach in named data networking. Future Generation Computer Systems, 96, 538-551. https://doi.org/10.1016/j.future.2018.12.049

Named Data Networking (NDN) is a new paradigm for the future Internet infrastructure based on routable named data. The NDN infrastructure consists of a new component called strategy layer. The strategy layer allows for dynamically selecting network i... Read More about A reliable adaptive forwarding approach in named data networking.

A trust-based method for mitigating cache poisoning in Name Data Networking (2017)
Journal Article
Rezaeifar, Z., Wang, J., & Oh, H. (2018). A trust-based method for mitigating cache poisoning in Name Data Networking. Journal of Network and Computer Applications, 104, 117-132. https://doi.org/10.1016/j.jnca.2017.12.013

Mitigating Cache poisoning in Name Data Networking (NDN) can significantly improve the effect of ubiquitous data caching, which is a prominent feature in NDN. However, since verification signatures cannot be practical in the network routers, finding... Read More about A trust-based method for mitigating cache poisoning in Name Data Networking.

Analysis of security issues in wireless charging of electric vehicles on the move (2016)
Journal Article
Rezaeifar, Z., & Oh, H. (2016). Analysis of security issues in wireless charging of electric vehicles on the move. Journal of the Korea Institute of Information Security & Cryptology, 26(4), 941-951. https://doi.org/10.13089/JKIISC.2016.26.4.941

Limitation of fossil energy from one side and the efficiency of the electrical engine from another side motivate the industrials to encourage people for utilizing electric vehicles (EVs). To decrease the cost of EVs, the size of battery should be red... Read More about Analysis of security issues in wireless charging of electric vehicles on the move.

A new privacy aware payment scheme for wireless charging of electric vehicles (2016)
Journal Article
Rezaeifar, Z., Hussain, R., Kim, S., & Oh, H. (2017). A new privacy aware payment scheme for wireless charging of electric vehicles. Wireless Personal Communications, 92(3), 1011-1028. https://doi.org/10.1007/s11277-016-3589-x

Electric vehicles (EVs) can be considered as a revolution in the combustion industry with significant improvement in fuel utilization and decrease in pollution compared to combustion engines. However, by decreasing the size of the battery to reduce t... Read More about A new privacy aware payment scheme for wireless charging of electric vehicles.

A paradigm shift from vehicular ad hoc networks to VANET-based clouds (2015)
Journal Article
Hussain, R., Rezaeifar, Z., & Oh, H. (2015). A paradigm shift from vehicular ad hoc networks to VANET-based clouds. Wireless Personal Communications, 83(2), 1131-1158. https://doi.org/10.1007/s11277-015-2442-y

Vehicular ad hoc network (VANET) is expected to improve our driving experience through enhanced safety, security, robustness, and infotainment. Nevertheless, despite considerable amount of research, VANET did not make it, at least not on a full scale... Read More about A paradigm shift from vehicular ad hoc networks to VANET-based clouds.

A reliable geocast routing protocol for Vehicular Ad Hoc Networks (2015)
Journal Article
Rezaeifar, Z., Hendessi, F., Ghahfarokhi, B. S., & Gulliver, T. A. (2015). A reliable geocast routing protocol for Vehicular Ad Hoc Networks. Wireless Personal Communications, 83(1), 281-295. https://doi.org/10.1007/s11277-015-2393-3

In addition to safety applications, new Vehicular Ad-Hoc Network (VANET) applications such as onboard entertainment and traffic management are rapidly being developed. This has made geocast, i.e. the transmission of data over a geographic area, an im... Read More about A reliable geocast routing protocol for Vehicular Ad Hoc Networks.

On secure, privacy-aware, and efficient beacon broadcasting among one-hop neighbors in VANETs (2014)
Conference Proceeding
Hussain, R., Rezaeifar, Z., Kim, D., Tokuta, A. O., & Oh, H. (2014). On secure, privacy-aware, and efficient beacon broadcasting among one-hop neighbors in VANETs. In 2014 IEEE Military Communications Conference (1427-1434). https://doi.org/10.1109/MILCOM.2014.236

Many Vehicular Ad Hoc Network (VANET) applications achieve a decent packet delivery ratio using mobility information in the beacon messages broadcasted to the single hop neighbours. Recently it has been found that if two VANET nodes are not within a... Read More about On secure, privacy-aware, and efficient beacon broadcasting among one-hop neighbors in VANETs.