NOTRINO: a NOvel hybrid TRust management scheme for INternet-Of-vehicles

Journal article


Ahmad, F., Kurugollu, Fatih, Kerrache, Chaker Abdelaziz, Sezer, Sakir and Liu, Lu 2021. NOTRINO: a NOvel hybrid TRust management scheme for INternet-Of-vehicles. IEEE Transactions on Vehicular Technology. https://doi.org/10.1109/TVT.2021.3049189
AuthorsAhmad, F., Kurugollu, Fatih, Kerrache, Chaker Abdelaziz, Sezer, Sakir and Liu, Lu
Abstract

Internet-of-Vehicles (IoV) is a novel technology to
ensure safe and secure transportation by enabling smart vehicles
to communicate and share sensitive information with each other.
However, the realization of IoV in real-life depends on several
factors, including the assurance of security from attackers
and propagation of authentic, accurate and trusted information
within the network. Further, the dissemination of compromised
information must be detected and vehicle disseminating such
malicious messages must be revoked from the network. To this
end, trust can be integrated within the network to detect the
trustworthiness of the received information. However, most of
the trust models in the literature relies on evaluating node
or data at the application layer. In this study, we propose a
novel hybrid trust management scheme, namely, NOTRINO,
which evaluates trustworthiness on the received information
in two steps. First step evaluates trust on the node itself at
transport layer, while second step computes trustworthiness
of the data at application layer. This mechanism enables the
vehicles to efficiently model and evaluate the trustworthiness
on the received information. The performance and accuracy of
NOTRINO is rigorously evaluated under various realistic trust
evaluation criteria (including precision, recall, F-measure and
trust). Furthermore, the efficiency of NOTRINO is evaluated in
presence of malicious nodes and its performance is benchmarked
against three hybrid trust models. Extensive simulations indicate
that NOTRINO achieve over 75% trust level as compared to
benchmarked trust models where trust level falls below 60% for
a network with 35% malicious nodes. Similarly, 92% precision
and 87% recall are achieved simultaneously with NOTRINO for
the same network, comparing to benchmark trust models where
precision and recall falls below 87% and 85% respectively.

KeywordsConnected Vehicles, Trust Management, Trust Model, Smart Cities, Internet-of-Vehicles
Year2021
JournalIEEE Transactions on Vehicular Technology
PublisherIEEE
ISSN1939-9359
Digital Object Identifier (DOI)https://doi.org/10.1109/TVT.2021.3049189
Web address (URL)http://hdl.handle.net/10545/625517
http://creativecommons.org/publicdomain/zero/1.0/
hdl:10545/625517
Publication dates05 Jan 2021
Publication process dates
Deposited15 Jan 2021, 12:38
Accepted24 Nov 2020
Rights

CC0 1.0 Universal

ContributorsCoventry University, University of Derby, Universit Amar Telidji Laghouat, 243326 Laghouat, Laghouat, Algeria, Queen's University Belfast and University of Leicester
File
File Access Level
Open
File
File Access Level
Open
File
File Access Level
Open
Permalink -

https://repository.derby.ac.uk/item/94zz5/notrino-a-novel-hybrid-trust-management-scheme-for-internet-of-vehicles

Download files

  • 329
    total views
  • 33
    total downloads
  • 4
    views this month
  • 3
    downloads this month

Export as

Related outputs

Two-Level Dynamic Programming-Enabled Non-Metric Data Aggregation Technique for the Internet of Things
Jan, S.R., Ghaleb, B., Tariq, U.U., Ali, H., Sabrina, F. and Liu, L. 2024. Two-Level Dynamic Programming-Enabled Non-Metric Data Aggregation Technique for the Internet of Things. Electronics. 13 (9), pp. 1-17. https://doi.org/10.3390/electronics13091651
Deep labeller: automatic bounding box generation for synthetic violence detection datasets
Nadeem, M., Kurugollu, F., Saravi, S., Atlam, H. and Franqueira, V. 2023. Deep labeller: automatic bounding box generation for synthetic violence detection datasets. Multimedia Tools and Applications. pp. 1-18. https://doi.org/10.1007/s11042-023-15621-5
Front and Back Views Gait Recognitions Using EfficientNets and EfficientNetV2 Models Based on Gait Energy Image
Tengku Mohd Afendi, Zulcaffle,, Kurugollu, F., Kuryati, K., Joseph, A. and Bong, D. L. 2023. Front and Back Views Gait Recognitions Using EfficientNets and EfficientNetV2 Models Based on Gait Energy Image. International Journal of Computing and Digital Systems. 2, pp. 1-10. https://doi.org/10.12785/ijcds/XXXXXX
Explaining deep neural networks: A survey on the global interpretation methods
Saleem, R., Yuan, B., Kurugollu, F., Anjum, A. and Liu, L. 2022. Explaining deep neural networks: A survey on the global interpretation methods. Neurocomputing. 513, pp. 165-180. https://doi.org/10.1016/j.neucom.2022.09.129
Severity Estimation of Plant Leaf Diseases Using Segmentation Method
Entuni, Chyntia Jaby, Afendi Zulcaffle, Tengku Mohd, Kipli, Kuryati and Kurugollu, Fatih 2020. Severity Estimation of Plant Leaf Diseases Using Segmentation Method. Applied Science and Engineering Progress. 14 (1), pp. 108-119. https://doi.org/10.14416/j.asep.2020.11.004
Explaining probabilistic Artificial Intelligence (AI) models by discretizing Deep Neural Networks
Saleem, Rabia, Yuan, Bo, Kurugollu, Fatih and Anjum, Ashiq 2020. Explaining probabilistic Artificial Intelligence (AI) models by discretizing Deep Neural Networks. IEEE. https://doi.org/10.1109/ucc48980.2020.00070
A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices
Varan, Metin, Akgul, Akif, Kurugollu, Fatih, Sansli, Ahmet and Smith, K. 2021. A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices. Complexity. 2021, pp. 1-15. https://doi.org/10.1155/2021/2798534
Energy-aware scheduling of streaming applications on edge-devices in IoT based healthcare
Tariq, Umair Ullah, Ali, Haider, Liu, Lu, Hardy, J., Kazim, M. and Ahmed, Waqar 2021. Energy-aware scheduling of streaming applications on edge-devices in IoT based healthcare. IEEE Transactions on Green Communications and Networking. https://doi.org/10.1109/tgcn.2021.3056479
An experimental online judge system based on docker container for learning and teaching assistance
Yibo, Han, Zhang, Zheng, Yuan, Bo, Bi, Haixia, Shahzad, Mohammad Nasir and Liu, Lu 2020. An experimental online judge system based on docker container for learning and teaching assistance. IEEE. https://doi.org/10.1109/smartworld-uic-atc-scalcom-iop-sci.2019.00264
A privacy-preserved probabilistic routing index model for decentralised online social networks
Yuan, Bo, Gu, Jiayan and Liu, Lu 2020. A privacy-preserved probabilistic routing index model for decentralised online social networks. IEEE. https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00305
Persation: an IoT based personal safety prediction model aided solution
Alofe, Olasunkanmi Matthew, Fatema, Kaniz, Azad, Muhammad Ajmal and Kurugollu, Fatih 2020. Persation: an IoT based personal safety prediction model aided solution. International Journal of Computing and Digital Systems.
MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles
Ahmad, F., Kurugollu, Fatih, Adnane, Asma, Hussain, Rasheed and Hussain, Fatima 2020. MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles. IEEE Internet of Things. https://doi.org/10.1109/JIOT.2020.2967568
CRT-BIoV: A cognitive radio technique for blockchain-enabled internet of vehicles
Rathee, Geetanjali, Ahmad, F., Kurugollu, Fatih, Azad, Muhammad, Iqbal, Razi and Imran, Muhammad 2020. CRT-BIoV: A cognitive radio technique for blockchain-enabled internet of vehicles. IEEE Transactions on Intelligent Transportation Systems. https://doi.org/10.1109/TITS.2020.3004718
A first look at privacy analysis of COVID-19 contact tracing mobile applications
Azad, Muhammad Ajmal, Arshad, Junaid, Akmal, Syed Muhammad Ali, Riaz, Farhan, Abdullah, Sidrah, Imran, Muhammad and Ahmad, F. 2020. A first look at privacy analysis of COVID-19 contact tracing mobile applications. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2020.3024180
Exploring network embedding for efficient message routing in opportunistic mobile social networks
Yuan, Bo, Anjum, Ashiq, Panneerselvam, J. and Liu, Lu 2020. Exploring network embedding for efficient message routing in opportunistic mobile social networks. IEEE. https://doi.org/10.1109/ICDMW.2019.00077
Vehicular sensor networks: Applications, advances and challenges
Kurugollu, Fatih, Ahmed, Syed Hassan, Hussain, Rasheed, Ahmad, F. and Kerrache, Chaker Abdelaziz 2020. Vehicular sensor networks: Applications, advances and challenges. Sensors. https://doi.org/10.3390/s20133686
Spatio-temporal rich model-based video steganalysis on cross sections of motion vector planes
Tasdemir, Kasim, Kurugollu, Fatih and Sezer, Sakir 2016. Spatio-temporal rich model-based video steganalysis on cross sections of motion vector planes. IEEE Transactions on Image Processing. https://doi.org/10.1109/TIP.2016.2567073
An efficient evolutionary user interest community discovery model in dynamic social networks for internet of people
Jiang, Liang, Shi, Leilei, Lu, Liu, Yao, Jingjing, Yuan, Bo and Zheng, Yongjun 2019. An efficient evolutionary user interest community discovery model in dynamic social networks for internet of people. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2019.2893625
Petri net-based methods for analyzing structural security in e-commerce business processes
Ding, Zhijun, Liu, Lu, Wang, Xiaoming, Crossley, Richard David, Yu, Wangyang and Wangyang, Yu 2018. Petri net-based methods for analyzing structural security in e-commerce business processes. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2018.04.090
Cascaded multimodal biometric recognition framework
Albesher, Badr, Kurugollu, Fatih, Bouridane, Ahmed and Baig, Asim 2013. Cascaded multimodal biometric recognition framework. IET Biometrics. https://doi.org/10.1049/iet-bmt.2012.0043
Privacy region protection for H.264/AVC with enhanced scrambling effect and a low bitrate overhead
Wang, Yongsheng, O׳Neill, Máire, Kurugollu, Fatih and O׳Sullivan, Elizabeth 2015. Privacy region protection for H.264/AVC with enhanced scrambling effect and a low bitrate overhead. Signal Processing: Image Communication. https://doi.org/10.1016/j.image.2015.04.013
Blind image watermark detection algorithm based on discrete shearlet transform using statistical decision theory
Ahmaderaghi, Baharak, Kurugollu, Fatih, Rincon, Jesus Martinez Del and Bouridane, Ahmed 2018. Blind image watermark detection algorithm based on discrete shearlet transform using statistical decision theory. IEEE Transactions on Computational Imaging. https://doi.org/10.1109/TCI.2018.2794065
Frontal view gait recognition with fusion of depth features from a time of flight camera
Afendi Tengku Mohd, Kurugollu, Fatih, Crookes, Danny, Bouridane, Ahmed and Farid, Mohsen 2018. Frontal view gait recognition with fusion of depth features from a time of flight camera. IEEE Transactions on Information Forensics and Security. https://doi.org/10.1109/TIFS.2018.2870594
Towards a trusted unmanned aerial system using blockchain (BUAS) for the protection of critical infrastructure
Barka, Ezedin, Kerrache, Chaker Abdelaziz, Benkraouda, Hadjer, Shuaib, Khaled, Ahmad, F. and Kurugollu, Fatih 2019. Towards a trusted unmanned aerial system using blockchain (BUAS) for the protection of critical infrastructure. Transactions on Emerging Telecommunications Technologies. https://doi.org/10.1002/ett.3706
A comparative analysis of trust models for safety applications in IoT-enabled vehicular networks
Ahmad, F., Adnane, Asma, Hussain, Rasheed and Kurugollu, Fatih 2019. A comparative analysis of trust models for safety applications in IoT-enabled vehicular networks. IEEE.
A survey of deep learning solutions for multimedia visual content analysis.
Nadeem, Muhammad Shahroz, Franqueira, Virginia N. L., Zhai, Xiaojun and Kurugollu, Fatih 2019. A survey of deep learning solutions for multimedia visual content analysis. IEEE Access. https://doi.org/10.1109/ACCESS.2019.DOI
A GRU-based prediction framework for intelligent resource management at cloud data centres in the age of 5G
Lu, Yao, Liu, Lu, Panneerselvam, J., Yuan, Bo, Gu, Jiayan and Antonopoulos, Nick 2019. A GRU-based prediction framework for intelligent resource management at cloud data centres in the age of 5G. IEEE Transactions on Cognitive Communications and Networking. 6 (2), pp. 486-498. https://doi.org/10.1109/tccn.2019.2954388
An inductive content-augmented network embedding model for edge artificial intelligence
Yuan, Bo, Panneerselvam, J., Liu, Lu, Antonopoulos, Nick and Lu, Yao 2019. An inductive content-augmented network embedding model for edge artificial intelligence. IEEE Transactions on Industrial Informatics. 15 (7), pp. 4295-4305. https://doi.org/10.1109/TII.2019.2902877
Realization of blockchain in named data networking-based internet-of-vehicles
Ahmad, F., Kerrache, Chaker Abdelaziz, Kurugollu, Fatih and Hussain, Rasheed 2019. Realization of blockchain in named data networking-based internet-of-vehicles. IT Professional. https://doi.org/10.1109/MITP.2019.2912142
A load-balancing mechanism for distributed SDN control plane using response time.
Cui, Jie, Lu, Qinghe, Zhong, Hong, Tian, Miaomiao and Liu, Lu 2018. A load-balancing mechanism for distributed SDN control plane using response time. IEEE Transactions on Network and Service Management. https://doi.org/10.1109/TNSM.2018.2876369
Spatio-temporal rich model-based video steganalysis on cross sections of motion vector planes.
Tasdemir, Kasim, Kurugollu, Fatih and Sezer, Sakir 2016. Spatio-temporal rich model-based video steganalysis on cross sections of motion vector planes. IEEE Transactions on Image Processing. https://doi.org/10.1109/TIP.2016.2567073
Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks.
Cui, Jie, Shao, Lili, Zhong, Hong, Xu, Yan and Liu, Lu 2017. Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-017-0581-5
Efficient service discovery in decentralized online social networks.
Yuan, Bo, Liu, Lu and Antonopoulos, Nikolaos 2017. Efficient service discovery in decentralized online social networks. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.04.022
A novel multilevel index model for distributed service repositories.
Xu, Zhao, Wu, Yan, Miao, Dejun and Liu, Lu 2017. A novel multilevel index model for distributed service repositories. Tsinghua Science and Technology. https://doi.org/10.23919/TST.2017.7914199
Link quality aware channel allocation for multichannel body sensor networks.
Gao, Weifeng, Zhao, Zhiwei, Min, Geyong, Cao, Yue, Duan, Hancong, Liu, Lu, Long, Yimiao and Yin, Guangqiang 2017. Link quality aware channel allocation for multichannel body sensor networks. Pervasive and Mobile Computing. https://doi.org/10.1016/j.pmcj.2017.02.004
Public auditing with privacy protection in a multi-user model of cloud-assisted body sensor networks.
Li, Song, Cui, Jie, Zhong, Hong and Liu, Lu 2017. Public auditing with privacy protection in a multi-user model of cloud-assisted body sensor networks. Sensors. https://doi.org/10.3390/s17051032
Performance formula-based optimal deployments of multilevel indices for service retrieval.
Wu, Yan, Xu, Wei, Liu, Lu and Miao, Dejun 2017. Performance formula-based optimal deployments of multilevel indices for service retrieval. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.4265
Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks.
Zhong, Hong, Huang, Bo, Cui, Jie, Xu, Yan and Liu, Lu 2017. Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2782672
Energy-aware composition for wireless sensor networks as a service.
Zhou, Zhangbing, Zhao, Deng, Liu, Lu and Hung, Patrick C. K. 2017. Energy-aware composition for wireless sensor networks as a service. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.02.050
A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments.
Kazim, M., Liu, Lu, Zhu, Shao Ying and Zheng, Yongjun 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2873812
Man-In-The-Middle attacks in Vehicular Ad-Hoc Networks: Evaluating the impact of attackers’ strategies.
Ahmad, F., Adnane, Asma, Franqueira, Virginia N. L., Kurugollu, Fatih and Liu, Lu 2018. Man-In-The-Middle attacks in Vehicular Ad-Hoc Networks: Evaluating the impact of attackers’ strategies. Sensors. 18 (11), p. 4040. https://doi.org/10.3390/s18114040
An investigation into the impacts of task-level behavioural heterogeneity upon energy efficiency in Cloud datacentres.
Panneerselvam, J., Liu, Lu, Lu, Yao and Antonopoulos, Nikolaos 2018. An investigation into the impacts of task-level behavioural heterogeneity upon energy efficiency in Cloud datacentres. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.12.064
Interest-aware content discovery in peer-to-peer social networks.
Guo, Yonghong, Liu, Lu, Wu, Yan and Hardy, J. 2018. Interest-aware content discovery in peer-to-peer social networks. ACM Transactions on Internet Technology.
An efficient indexing model for the fog layer of industrial Internet of Things.
Miao, Dejun, Liu, Lu, Xu, Rongyan, Panneerselvam, J., Wu, Yan and Xu, Wei 2018. An efficient indexing model for the fog layer of industrial Internet of Things. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2018.2799598
A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments
Liu, Lu, Zhu, Shao Ying and Kazim, M. 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2873812
An approach to optimise resource provision with energy-awareness in datacentres by combating task heterogeneity.
Liu, Lu, Antonopoulos, Nikolaos and Panneerselvam, J. 2018. An approach to optimise resource provision with energy-awareness in datacentres by combating task heterogeneity. IEEE Transactions on Emerging Topics in Computing. https://doi.org/10.1109/TETC.2018.2794328
TEAM: A trust evaluation and management framework in context-enabled vehicular ad-hoc networks.
Ahmad, F., Franqueira, Virginia N. L. and Adnane, Asma 2018. TEAM: A trust evaluation and management framework in context-enabled vehicular ad-hoc networks. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2837887
Verifiable public key encryption scheme with equality test in 5G networks
Xu, Yan, Wang, Ming, Zhong, Hong, Cui, Jie, Liu, Lu and Franqueira, Virginia N. L. 2017. Verifiable public key encryption scheme with equality test in 5G networks. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2716971
RTS: road topology-based scheme for traffic condition estimation via vehicular crowdsensing
Shao, Lu, Wang, Cheng, Liu, Lu and Jiang, Changjun 2016. RTS: road topology-based scheme for traffic condition estimation via vehicular crowdsensing. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.3778
Achieving green IT using VDI in cyber physical society
Liu, Lu, DaSilva, Don-Anthony, Antonopoulos, Nikolaos, Ding, Zhijun and Zhan, Yongzhao 2013. Achieving green IT using VDI in cyber physical society. Journal of Internet Technology.
Faith in vehicles: A set of evaluation criteria for trust management in vehicular ad-hoc network
Ahmad, F., Hall, Jordan, Adnane, Asma and Franqueira, Virginia N. L. 2017. Faith in vehicles: A set of evaluation criteria for trust management in vehicular ad-hoc network. IEEE.
Internet-of-Things-based smart cities: Recent advances and challenges.
Mehmood, Yasir, Ahmad, F., Yaqoob, Ibrar, Adnane, Asma, Imran, Muhammad and Guizani, Sghaier 2017. Internet-of-Things-based smart cities: Recent advances and challenges. IEEE Communications Magazine. https://doi.org/10.1109/MCOM.2017.1600514
Event detection and user interest discovering in social media data streams
Shi, Lei-lei, Liu, Lu, Wu, Yan, Jiang, Liang and Hardy, J. 2017. Event detection and user interest discovering in social media data streams. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2675839
Collaborative actuation of wireless sensor and actuator networks for the agriculture industry.
Bai, Xingzhen, Liu, Lu, Cao, Maoyong, Panneerselvam, J., Sun, Qiao and Wang, Haixia 2017. Collaborative actuation of wireless sensor and actuator networks for the agriculture industry. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2725342
InOt-RePCoN: Forecasting user behavioural trend in large-scale cloud environments.
Panneerselvam, J., Liu, Lu and Antonopoulos, Nikolaos 2017. InOt-RePCoN: Forecasting user behavioural trend in large-scale cloud environments. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.05.022
Mobilouds: An energy efficient MCC collaborative framework with extended mobile participation for next generation networks
Panneerselvam, J., Hardy, J., Liu, Lu, Yuan, Bo and Antonopoulos, Nikolaos 2017. Mobilouds: An energy efficient MCC collaborative framework with extended mobile participation for next generation networks. IEEE Access. https://doi.org/10.1109/ACCESS.2016.2602321
Digital video source identification based on green-channel photo response non-uniformity (G-PRNU)
Al-Athamneh, Mohammad, Kurugollu, Fatih, Crookes, Danny and Farid, Mohsen 2016. Digital video source identification based on green-channel photo response non-uniformity (G-PRNU). https://doi.org/10.5121/csit.2016.61105
Big-Data analytics and cloud computing: Theory, algorithms and applications
Hill, Richard, Trovati, Marcello, Liu, Lu, Anjum, Ashiq and Zhu, Shao Ying 2015. Big-Data analytics and cloud computing: Theory, algorithms and applications. Springer.
A critical comparative evaluation on DHT-based peer-to-peer search algorithms
Betts, Alexander, Liu, Lu, Li, Zhiyuan and Antonopoulos, Nikolaos 2014. A critical comparative evaluation on DHT-based peer-to-peer search algorithms. International Journal of Embedded Systems. https://doi.org/10.1504/IJES.2014.063823
Enhanced timeline analysis for digital forensic investigations
Inglot, Bartosz and Liu, Lu 2014. Enhanced timeline analysis for digital forensic investigations. Information Security Journal: A Global Perspective. https://doi.org/10.1080/19393555.2014.897401
An integrated approach to developing self-adaptive software in open environments
Mao, Xinjun, Dong, Menggao, Liu, Lu and Wang, Huaiming 2014. An integrated approach to developing self-adaptive software in open environments. Journal of Information Science and Engineering.
CloudMon: a resource-efficient IaaS cloud monitoring system based on networked intrusion detection system virtual appliances
Li, Bo, Li, Jianxin and Liu, Lu 2015. CloudMon: a resource-efficient IaaS cloud monitoring system based on networked intrusion detection system virtual appliances. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.3166
An investigation of security trends in personal wireless networks
Liu, Lu, Stimpson, Thomas, Antonopoulos, Nikolaos, Ding, Zhijun and Zhan, Yongzhao 2013. An investigation of security trends in personal wireless networks. Wireless Personal Communications. https://doi.org/10.1007/s11277-013-1386-3
Performance evaluation and simulation of peer-to-peer protocols for Massively Multiplayer Online Games
Liu, Lu, Jones, Andrew, Antonopoulos, Nikolaos, Ding, Zhijun and Zhan, Yongzhao 2013. Performance evaluation and simulation of peer-to-peer protocols for Massively Multiplayer Online Games. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-013-1662-y
Virtual vignettes: the acquisition, analysis, and presentation of social network data
Howden, Chris, Liu, Lu, Li, Zhiyuan, Li, Jianxin and Antonopoulos, Nikolaos 2014. Virtual vignettes: the acquisition, analysis, and presentation of social network data. Science China Information Sciences. https://doi.org/10.1007/s11432-014-5069-9
An Efficient SDN load balancing scheme based on variance analysis for massive mobile users
Zhong, Hong, Lin, Qunfeng, Cui, Jie, Shi, Runhua and Liu, Lu 2015. An Efficient SDN load balancing scheme based on variance analysis for massive mobile users. Mobile Information Systems. https://doi.org/10.1155/2015/241732
An adaptive secure communication framework for mobile peer-to-peer environments using Bayesian games
Li, Zhiyuan, Liu, Lu, Chen, Rulong and Bi, Jun-Lei 2015. An adaptive secure communication framework for mobile peer-to-peer environments using Bayesian games. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-015-0376-5
Cloud BI: Future of business intelligence in the Cloud
Al-Aqrabi, Hussain, Liu, Lu, Hill, Richard and Antonopoulos, Nikolaos 2014. Cloud BI: Future of business intelligence in the Cloud. Journal of Computer and System Sciences. https://doi.org/10.1016/j.jcss.2014.06.013
Toward a flexible and fine-grained access control framework for infrastructure as a service clouds
Li, Bo, Li, Jianxin, Liu, Lu and Zhou, Chao 2015. Toward a flexible and fine-grained access control framework for infrastructure as a service clouds. Security and Communication Networks. https://doi.org/10.1002/sec.1216
Dynamic resource discovery based on preference and movement pattern similarity for large-scale social internet of things
Li, Zhiyuan, Chen, Rulong, Liu, Lu and Min, Geyong 2015. Dynamic resource discovery based on preference and movement pattern similarity for large-scale social internet of things. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2015.2451138
An adaptive multilevel indexing method for disaster service discovery
Wu, Yan, Yan, Chun Gang, Liu, Lu, Ding, Zhijun and Jiang, Changjun 2014. An adaptive multilevel indexing method for disaster service discovery. IEEE Transactions on Computers. https://doi.org/10.1109/TC.2014.2378273
A socioecological model for advanced service discovery in machine-to-machine communication networks
Liu, Lu, Antonopoulos, Nikolaos, Zheng, Minghui, Zhan, Yongzhao and Ding, Zhijun 2016. A socioecological model for advanced service discovery in machine-to-machine communication networks. ACM Transactions on Embedded Computing Systems. https://doi.org/10.1145/2811264
RVLBPNN: A workload forecasting model for smart cloud computing
Lu, Yao, Panneerselvam, J., Liu, Lu and Wu, Yan 2016. RVLBPNN: A workload forecasting model for smart cloud computing. Scientific Programming. https://doi.org/10.1155/2016/5635673
CCLBR: Congestion control-based load balanced routing in unstructured P2P systems
Shen, Xiang-Jun, Chang, Qing, Liu, Lu, Panneerselvam, J. and Zha, Zheng-Jun 2016. CCLBR: Congestion control-based load balanced routing in unstructured P2P systems. IEEE Systems Journal. https://doi.org/10.1109/JSYST.2016.2558515
An efficient algorithm for partially matched services in internet of services
Ahmed, Mariwan, Liu, Lu, Hardy, J., Yuan, Bo and Antonopoulos, Nikolaos 2016. An efficient algorithm for partially matched services in internet of services. Personal and Ubiquitous Computing. https://doi.org/10.1007/s00779-016-0917-9
A systematic approach for cyber security in vehicular networks
Ahmad, F., Adnane, Asma and Franqueira, Virginia N. L. 2016. A systematic approach for cyber security in vehicular networks. Journal of Computer and Communications. https://doi.org/10.4236/jcc.2016.416004
A novel context-based risk assessment approach in vehicular networks
Ahmad, F. and Adnane, Asma 2016. A novel context-based risk assessment approach in vehicular networks. IEEE. https://doi.org/10.1109/WAINA.2016.60
Evaluation platform for trust in vehicular ad hoc networks
Ahmad, F. and Adnane, Asma 2016. Evaluation platform for trust in vehicular ad hoc networks.
Vehicular cloud networks: Architecture, applications and security issues
Ahmad, F., Kazim, M., Adnane, Asma and Abir, Awad 2015. Vehicular cloud networks: Architecture, applications and security issues. IEEE. https://doi.org/10.1109/UCC.2015.101
Vehicular cloud networks: Architecture and security
Ahmad, F., Kazim, M. and Adnane, Asma 2015. Vehicular cloud networks: Architecture and security. in: Springer.
Design of trust based context aware routing protocol in vehicular networks
Ahmad, F. and Adnane, Asma 2015. Design of trust based context aware routing protocol in vehicular networks.
A critical review of the routing protocols in opportunistic networks
Panneerselvam, J., Atojoko, Anthony, Smith, K., Liu, Lu and Antonopoulos, Nikolaos 2014. A critical review of the routing protocols in opportunistic networks. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems. https://doi.org/10.4108/inis.1.1.e6
iMIG: Toward an adaptive live migration method for KVM virtual machines
Li, Jianxin, Zhao, Jieyu Zhao, Li, Yi, Cui, Lei, Li, Bo, Liu, Lu and Panneerselvam, J. 2014. iMIG: Toward an adaptive live migration method for KVM virtual machines. The Computer Journal. https://doi.org/10.1093/comjnl/bxu065
Achieving dynamic load balancing through mobile agents in small world P2P networks
Shen, Xiang-Jun, Liu, Lu, Zha, Zheng-Jun, Gu, Pei-Ying, Jiang, Zhong-Qiu, Chen, Ji-Ming and Panneerselvam, J. 2014. Achieving dynamic load balancing through mobile agents in small world P2P networks. Computer Networks. https://doi.org/10.1016/j.comnet.2014.05.003
Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework
Ikram, Ahsan, Anjum, Ashiq, Hill, Richard, Antonopoulos, Nikolaos, Liu, Lu and Sotiriadis, Stelios 2013. Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.3131
Energy performance assessment of virtualization technologies using small environmental monitoring sensors
Liu, Lu, Masfary, Osama and Antonopoulos, Nikolaos 2012. Energy performance assessment of virtualization technologies using small environmental monitoring sensors. Sensors. https://doi.org/10.3390/s120506610
Adaptive service discovery on service-oriented and spontaneous sensor systems
Liu, Lu, Xu, Jie, Antonopoulos, Nikolaos, Li, Jianxin and Wu, Kaigu 2012. Adaptive service discovery on service-oriented and spontaneous sensor systems. Adhoc & Sensor Wireless Networks.
Dynamic service integration for reliable and sustainable capability provision
Liu, Lu, Xu, Jie, Russell, Duncan, Davies, John K., Webster, David, Luo, Zongyang and Venters, Colin 2010. Dynamic service integration for reliable and sustainable capability provision. International Journal of Systems Science. https://doi.org/10.1080/00207721003774736
Fault-tolerant peer-to-peer search on small-world networks
Liu, Lu, Antonopoulos, Nikolaos and Mackin, Stephen 2007. Fault-tolerant peer-to-peer search on small-world networks. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2007.03.002
Managing peer-to-peer networks with human tactics in social interactions
Liu, Lu, Antonopoulos, Nikolaos and Mackin, Stephen 2007. Managing peer-to-peer networks with human tactics in social interactions. The Journal of Supercomputing. https://doi.org/10.1007/s11227-007-0156-y
Distributed service integration for disaster monitoring sensor systems
Liu, Lu, Antonopoulos, Nikolaos, Xu, Jie, Webster, David and Wu, Kaigu 2011. Distributed service integration for disaster monitoring sensor systems. IET Communications. https://doi.org/10.1049/iet-com.2010.0630
CyberGuarder: a virtualization security assurance architecture for green cloud computing
Li, Jianxin, Li, Bo, Wo, Tianyu, Hu, Chunming, Huai, Jinpeng, Liu, Lu and Lam, K.P. 2012. CyberGuarder: a virtualization security assurance architecture for green cloud computing. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2011.04.012
Editorial: Special issue on dependable peer-to-peer systems
Liu, Lu and Xu, Jie 1931. Editorial: Special issue on dependable peer-to-peer systems. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-009-0065-3
Modelling and simulation of network enabled capability on service-oriented architecture
Liu, Lu, Russell, Duncan, Xu, Jie, Webster, David, Luo, Zongyang, Venters, Colin and Davies, John K. 2009. Modelling and simulation of network enabled capability on service-oriented architecture. Simulation Modelling Practice and Theory. https://doi.org/10.1016/j.simpat.2009.06.012
CyberLiveApp: a secure sharing and migration approach for live virtual desktop applications in a cloud environment
Li, Jianxin, Jia, Yu, Liu, Lu and Wo, Tianyu 2011. CyberLiveApp: a secure sharing and migration approach for live virtual desktop applications in a cloud environment. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2011.08.001
Efficient resource discovery in self-organized unstructured peer-to-peer networks
Liu, Lu, Antonopoulos, Nikolaos, Mackin, Stephen, Xu, Jie and Russell, Duncan 2008. Efficient resource discovery in self-organized unstructured peer-to-peer networks. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.1329
Efficient and scalable search on scale-free P2P networks
Liu, Lu, Xu, Jie, Russell, Duncan, Townend, Paul and Webster, David 2009. Efficient and scalable search on scale-free P2P networks. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-008-0023-5
HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree
Li, Jianxin, Liu, Xudong, Liu, Lu, Sun, Dazhi and Li, Bo 2011. HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree. Telecommunication Systems. https://doi.org/10.1007/s11235-011-9648-4
Dynamic authentication for cross-realm SOA-based business processes
Xu, Jie, Zhang, Dacheng, Li, Xianxian and Liu, Lu 2010. Dynamic authentication for cross-realm SOA-based business processes. IEEE Transactions on Services Computing. https://doi.org/10.1109/TSC.2010.33
Dot-base62x: building a compact and user-friendly text representation scheme of ipv6 addresses for cloud computing
Liu, Zhenxing, Liu, Lu, Hardy, J., Anjum, Ashiq, Hill, Richard and Antonopoulos, Nikolaos 2012. Dot-base62x: building a compact and user-friendly text representation scheme of ipv6 addresses for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications. https://doi.org/10.1186/2192-113X-1-3