Man-In-The-Middle attacks in Vehicular Ad-Hoc Networks: Evaluating the impact of attackers’ strategies.

Journal article


Ahmad, F., Adnane, Asma, Franqueira, Virginia N. L., Kurugollu, Fatih and Liu, Lu 2018. Man-In-The-Middle attacks in Vehicular Ad-Hoc Networks: Evaluating the impact of attackers’ strategies. Sensors. 18 (11), p. 4040. https://doi.org/10.3390/s18114040
AuthorsAhmad, F., Adnane, Asma, Franqueira, Virginia N. L., Kurugollu, Fatih and Liu, Lu
Abstract

Vehicular Ad-Hoc Network (VANET), a vital component of Intelligent Transportation Systems (ITS) technology, relies on communication between dynamically connected vehicles and static Road Side Units (RSU) to offer various applications (e.g., collision avoidance alerts, steep-curve warnings and infotainment). VANET has a massive potential to improve traffic efficiency, and road safety by exchanging critical information between nodes (vehicles and RSU), thus reducing the likelihood of traffic accidents. However, this communication between nodes is subject to a variety of attacks, such as Man-In-The-Middle (MITM) attacks which represent a major risk in VANET. It happens when a malicious node intercepts or tampers with messages exchanged between legitimate nodes. In this paper, we studied the impact on network performance of different strategies which attackers can adopt to launch MITM attacks in VANET, such as fleet or random strategies. In particular, we focus on three goals of MITM attacks—message delayed, message dropped and message tampered. The simulation results indicate that these attacks have a severe influence on the legitimate nodes in VANET as the network experience high number of compromised messages, high end-to-end delays and preeminent packet losses.

KeywordsVehicular Ad-Hoc network; Security; Man-In-The-Middle Attack; Smart Cities; Simulation; Intelligent Transportation System; Internet-of-Things
Year2018
JournalSensors
Journal citation18 (11), p. 4040
PublisherMDPI
ISSN1424-8220
Digital Object Identifier (DOI)https://doi.org/10.3390/s18114040
Web address (URL)http://hdl.handle.net/10545/623447
hdl:10545/623447
Publication dates20 Nov 2018
Publication process dates
Deposited30 Jan 2019, 13:10
Accepted18 Nov 2018
ContributorsUniversity of Derby and Loughborough University
File
File Access Level
Open
File
File Access Level
Open
Permalink -

https://repository.derby.ac.uk/item/95197/man-in-the-middle-attacks-in-vehicular-ad-hoc-networks-evaluating-the-impact-of-attackers-strategies

Download files

  • 24
    total views
  • 4
    total downloads
  • 1
    views this month
  • 0
    downloads this month

Export as

Related outputs

Explaining deep neural networks: A survey on the global interpretation methods
Saleem, R., Yuan, B., Kurugollu, F., Anjum, A. and Liu, L. 2022. Explaining deep neural networks: A survey on the global interpretation methods. Neurocomputing. 513, pp. 165-180. https://doi.org/10.1016/j.neucom.2022.09.129
Severity Estimation of Plant Leaf Diseases Using Segmentation Method
Entuni, Chyntia Jaby, Afendi Zulcaffle, Tengku Mohd, Kipli, Kuryati and Kurugollu, Fatih 2020. Severity Estimation of Plant Leaf Diseases Using Segmentation Method. Applied Science and Engineering Progress. 14 (1), pp. 108-119. https://doi.org/10.14416/j.asep.2020.11.004
Explaining probabilistic Artificial Intelligence (AI) models by discretizing Deep Neural Networks
Saleem, Rabia, Yuan, Bo, Kurugollu, Fatih and Anjum, Ashiq 2020. Explaining probabilistic Artificial Intelligence (AI) models by discretizing Deep Neural Networks. IEEE. https://doi.org/10.1109/ucc48980.2020.00070
NOTRINO: a NOvel hybrid TRust management scheme for INternet-Of-vehicles
Ahmad, F., Kurugollu, Fatih, Kerrache, Chaker Abdelaziz, Sezer, Sakir and Liu, Lu 2021. NOTRINO: a NOvel hybrid TRust management scheme for INternet-Of-vehicles. IEEE Transactions on Vehicular Technology. https://doi.org/10.1109/TVT.2021.3049189
A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices
Varan, Metin, Akgul, Akif, Kurugollu, Fatih, Sansli, Ahmet and Smith, K. 2021. A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices. Complexity. 2021, pp. 1-15. https://doi.org/10.1155/2021/2798534
Energy-aware scheduling of streaming applications on edge-devices in IoT based healthcare
Tariq, Umair Ullah, Ali, Haider, Liu, Lu, Hardy, J., Kazim, M. and Ahmed, Waqar 2021. Energy-aware scheduling of streaming applications on edge-devices in IoT based healthcare. IEEE Transactions on Green Communications and Networking. https://doi.org/10.1109/tgcn.2021.3056479
An experimental online judge system based on docker container for learning and teaching assistance
Yibo, Han, Zhang, Zheng, Yuan, Bo, Bi, Haixia, Shahzad, Mohammad Nasir and Liu, Lu 2020. An experimental online judge system based on docker container for learning and teaching assistance. IEEE. https://doi.org/10.1109/smartworld-uic-atc-scalcom-iop-sci.2019.00264
A privacy-preserved probabilistic routing index model for decentralised online social networks
Yuan, Bo, Gu, Jiayan and Liu, Lu 2020. A privacy-preserved probabilistic routing index model for decentralised online social networks. IEEE. https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00305
Persation: an IoT based personal safety prediction model aided solution
Alofe, Olasunkanmi Matthew, Fatema, Kaniz, Azad, Muhammad Ajmal and Kurugollu, Fatih 2020. Persation: an IoT based personal safety prediction model aided solution. International Journal of Computing and Digital Systems.
MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles
Ahmad, F., Kurugollu, Fatih, Adnane, Asma, Hussain, Rasheed and Hussain, Fatima 2020. MARINE: Man-in-the-middle attack resistant trust model IN connEcted vehicles. IEEE Internet of Things. https://doi.org/10.1109/JIOT.2020.2967568
CRT-BIoV: A cognitive radio technique for blockchain-enabled internet of vehicles
Rathee, Geetanjali, Ahmad, F., Kurugollu, Fatih, Azad, Muhammad, Iqbal, Razi and Imran, Muhammad 2020. CRT-BIoV: A cognitive radio technique for blockchain-enabled internet of vehicles. IEEE Transactions on Intelligent Transportation Systems. https://doi.org/10.1109/TITS.2020.3004718
A first look at privacy analysis of COVID-19 contact tracing mobile applications
Azad, Muhammad Ajmal, Arshad, Junaid, Akmal, Syed Muhammad Ali, Riaz, Farhan, Abdullah, Sidrah, Imran, Muhammad and Ahmad, F. 2020. A first look at privacy analysis of COVID-19 contact tracing mobile applications. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2020.3024180
Exploring network embedding for efficient message routing in opportunistic mobile social networks
Yuan, Bo, Anjum, Ashiq, Panneerselvam, J. and Liu, Lu 2020. Exploring network embedding for efficient message routing in opportunistic mobile social networks. IEEE. https://doi.org/10.1109/ICDMW.2019.00077
Vehicular sensor networks: Applications, advances and challenges
Kurugollu, Fatih, Ahmed, Syed Hassan, Hussain, Rasheed, Ahmad, F. and Kerrache, Chaker Abdelaziz 2020. Vehicular sensor networks: Applications, advances and challenges. Sensors. https://doi.org/10.3390/s20133686
Integration and evaluation of QUIC and TCP-BBR in longhaul science data transfers
Lopes, Raul H. C., Franqueira, Virginia N. L. and Duncan, Rand 2019. Integration and evaluation of QUIC and TCP-BBR in longhaul science data transfers. EPJ Web of Conferences. 214, p. 08026. https://doi.org/10.1051/epjconf/201921408026
Privacy verification of photoDNA based on machine learning
Nadeem, Muhammad Shahroz, Franqueira, Virginia N. L. and Zhai, Xiaojun 2019. Privacy verification of photoDNA based on machine learning. in: The Institution of Engineering and Technology (IET).
Spatio-temporal rich model-based video steganalysis on cross sections of motion vector planes
Tasdemir, Kasim, Kurugollu, Fatih and Sezer, Sakir 2016. Spatio-temporal rich model-based video steganalysis on cross sections of motion vector planes. IEEE Transactions on Image Processing. https://doi.org/10.1109/TIP.2016.2567073
An efficient evolutionary user interest community discovery model in dynamic social networks for internet of people
Jiang, Liang, Shi, Leilei, Lu, Liu, Yao, Jingjing, Yuan, Bo and Zheng, Yongjun 2019. An efficient evolutionary user interest community discovery model in dynamic social networks for internet of people. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2019.2893625
Petri net-based methods for analyzing structural security in e-commerce business processes
Ding, Zhijun, Liu, Lu, Wang, Xiaoming, Crossley, Richard David, Yu, Wangyang and Wangyang, Yu 2018. Petri net-based methods for analyzing structural security in e-commerce business processes. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2018.04.090
Cascaded multimodal biometric recognition framework
Albesher, Badr, Kurugollu, Fatih, Bouridane, Ahmed and Baig, Asim 2013. Cascaded multimodal biometric recognition framework. IET Biometrics. https://doi.org/10.1049/iet-bmt.2012.0043
Privacy region protection for H.264/AVC with enhanced scrambling effect and a low bitrate overhead
Wang, Yongsheng, O׳Neill, Máire, Kurugollu, Fatih and O׳Sullivan, Elizabeth 2015. Privacy region protection for H.264/AVC with enhanced scrambling effect and a low bitrate overhead. Signal Processing: Image Communication. https://doi.org/10.1016/j.image.2015.04.013
Blind image watermark detection algorithm based on discrete shearlet transform using statistical decision theory
Ahmaderaghi, Baharak, Kurugollu, Fatih, Rincon, Jesus Martinez Del and Bouridane, Ahmed 2018. Blind image watermark detection algorithm based on discrete shearlet transform using statistical decision theory. IEEE Transactions on Computational Imaging. https://doi.org/10.1109/TCI.2018.2794065
Frontal view gait recognition with fusion of depth features from a time of flight camera
Afendi Tengku Mohd, Kurugollu, Fatih, Crookes, Danny, Bouridane, Ahmed and Farid, Mohsen 2018. Frontal view gait recognition with fusion of depth features from a time of flight camera. IEEE Transactions on Information Forensics and Security. https://doi.org/10.1109/TIFS.2018.2870594
Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes
Al Mutawa, Noora, Bryce, Joanne, Franqueira, Virginia N.L., Marrington, Andrew and Read, Janet C. 2018. Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes. Digital Investigation. https://doi.org/10.1016/j.diin.2018.12.003
Analytical tools for blockchain: review, taxonomy and open challenges.
Balaskas, Anastasios and Franqueira, Virginia N. L. 2018. Analytical tools for blockchain: review, taxonomy and open challenges. IEE Explore. https://doi.org/10.1109/CyberSecPODS.2018.8560672
Blockchain-Based Distributed Marketplace.
Kabi, Oliver R. and Franqueira, Virginia N. L. 2019. Blockchain-Based Distributed Marketplace. in: Springer Nature.
Towards a trusted unmanned aerial system using blockchain (BUAS) for the protection of critical infrastructure
Barka, Ezedin, Kerrache, Chaker Abdelaziz, Benkraouda, Hadjer, Shuaib, Khaled, Ahmad, F. and Kurugollu, Fatih 2019. Towards a trusted unmanned aerial system using blockchain (BUAS) for the protection of critical infrastructure. Transactions on Emerging Telecommunications Technologies. https://doi.org/10.1002/ett.3706
A comparative analysis of trust models for safety applications in IoT-enabled vehicular networks
Ahmad, F., Adnane, Asma, Hussain, Rasheed and Kurugollu, Fatih 2019. A comparative analysis of trust models for safety applications in IoT-enabled vehicular networks. IEEE.
A survey of deep learning solutions for multimedia visual content analysis.
Nadeem, Muhammad Shahroz, Franqueira, Virginia N. L., Zhai, Xiaojun and Kurugollu, Fatih 2019. A survey of deep learning solutions for multimedia visual content analysis. IEEE Access. https://doi.org/10.1109/ACCESS.2019.DOI
A GRU-based prediction framework for intelligent resource management at cloud data centres in the age of 5G
Lu, Yao, Liu, Lu, Panneerselvam, J., Yuan, Bo, Gu, Jiayan and Antonopoulos, Nick 2019. A GRU-based prediction framework for intelligent resource management at cloud data centres in the age of 5G. IEEE Transactions on Cognitive Communications and Networking. 6 (2), pp. 486-498. https://doi.org/10.1109/tccn.2019.2954388
An inductive content-augmented network embedding model for edge artificial intelligence
Yuan, Bo, Panneerselvam, J., Liu, Lu, Antonopoulos, Nick and Lu, Yao 2019. An inductive content-augmented network embedding model for edge artificial intelligence. IEEE Transactions on Industrial Informatics. 15 (7), pp. 4295-4305. https://doi.org/10.1109/TII.2019.2902877
Realization of blockchain in named data networking-based internet-of-vehicles
Ahmad, F., Kerrache, Chaker Abdelaziz, Kurugollu, Fatih and Hussain, Rasheed 2019. Realization of blockchain in named data networking-based internet-of-vehicles. IT Professional. https://doi.org/10.1109/MITP.2019.2912142
A load-balancing mechanism for distributed SDN control plane using response time.
Cui, Jie, Lu, Qinghe, Zhong, Hong, Tian, Miaomiao and Liu, Lu 2018. A load-balancing mechanism for distributed SDN control plane using response time. IEEE Transactions on Network and Service Management. https://doi.org/10.1109/TNSM.2018.2876369
A tutorial introduction to IoT design and prototyping with examples.
Meruje, Manuel, Sumaila, Musa, Franqueira, Virginia N. L., Freire, Mario M. and Inacio, Pedro R. M. 2018. A tutorial introduction to IoT design and prototyping with examples. in: Wiley-IEEE Press.
Spatio-temporal rich model-based video steganalysis on cross sections of motion vector planes.
Tasdemir, Kasim, Kurugollu, Fatih and Sezer, Sakir 2016. Spatio-temporal rich model-based video steganalysis on cross sections of motion vector planes. IEEE Transactions on Image Processing. https://doi.org/10.1109/TIP.2016.2567073
Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks.
Cui, Jie, Shao, Lili, Zhong, Hong, Xu, Yan and Liu, Lu 2017. Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-017-0581-5
Cloud forensics and security
Franqueira, Virginia N. L., Lopes, Raul, Jones, Andrew and Storer, Tim 2017. Cloud forensics and security. SpringerOpen.
On Locky ransomware, Al Capone and Brexit
MacRae, John and Franqueira, Virginia N. L. 2018. On Locky ransomware, Al Capone and Brexit. in: Springer.
Efficient service discovery in decentralized online social networks.
Yuan, Bo, Liu, Lu and Antonopoulos, Nikolaos 2017. Efficient service discovery in decentralized online social networks. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.04.022
A novel multilevel index model for distributed service repositories.
Xu, Zhao, Wu, Yan, Miao, Dejun and Liu, Lu 2017. A novel multilevel index model for distributed service repositories. Tsinghua Science and Technology. https://doi.org/10.23919/TST.2017.7914199
Link quality aware channel allocation for multichannel body sensor networks.
Gao, Weifeng, Zhao, Zhiwei, Min, Geyong, Cao, Yue, Duan, Hancong, Liu, Lu, Long, Yimiao and Yin, Guangqiang 2017. Link quality aware channel allocation for multichannel body sensor networks. Pervasive and Mobile Computing. https://doi.org/10.1016/j.pmcj.2017.02.004
Public auditing with privacy protection in a multi-user model of cloud-assisted body sensor networks.
Li, Song, Cui, Jie, Zhong, Hong and Liu, Lu 2017. Public auditing with privacy protection in a multi-user model of cloud-assisted body sensor networks. Sensors. https://doi.org/10.3390/s17051032
Performance formula-based optimal deployments of multilevel indices for service retrieval.
Wu, Yan, Xu, Wei, Liu, Lu and Miao, Dejun 2017. Performance formula-based optimal deployments of multilevel indices for service retrieval. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.4265
Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks.
Zhong, Hong, Huang, Bo, Cui, Jie, Xu, Yan and Liu, Lu 2017. Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2782672
Energy-aware composition for wireless sensor networks as a service.
Zhou, Zhangbing, Zhao, Deng, Liu, Lu and Hung, Patrick C. K. 2017. Energy-aware composition for wireless sensor networks as a service. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.02.050
A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments.
Kazim, M., Liu, Lu, Zhu, Shao Ying and Zheng, Yongjun 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2873812
An investigation into the impacts of task-level behavioural heterogeneity upon energy efficiency in Cloud datacentres.
Panneerselvam, J., Liu, Lu, Lu, Yao and Antonopoulos, Nikolaos 2018. An investigation into the impacts of task-level behavioural heterogeneity upon energy efficiency in Cloud datacentres. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.12.064
Interest-aware content discovery in peer-to-peer social networks.
Guo, Yonghong, Liu, Lu, Wu, Yan and Hardy, J. 2018. Interest-aware content discovery in peer-to-peer social networks. ACM Transactions on Internet Technology.
An efficient indexing model for the fog layer of industrial Internet of Things.
Miao, Dejun, Liu, Lu, Xu, Rongyan, Panneerselvam, J., Wu, Yan and Xu, Wei 2018. An efficient indexing model for the fog layer of industrial Internet of Things. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2018.2799598
A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments
Liu, Lu, Zhu, Shao Ying and Kazim, M. 2018. A framework for orchestrating secure and dynamic access of IoT services in multi-cloud environments. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2873812
An approach to optimise resource provision with energy-awareness in datacentres by combating task heterogeneity.
Liu, Lu, Antonopoulos, Nikolaos and Panneerselvam, J. 2018. An approach to optimise resource provision with energy-awareness in datacentres by combating task heterogeneity. IEEE Transactions on Emerging Topics in Computing. https://doi.org/10.1109/TETC.2018.2794328
TEAM: A trust evaluation and management framework in context-enabled vehicular ad-hoc networks.
Ahmad, F., Franqueira, Virginia N. L. and Adnane, Asma 2018. TEAM: A trust evaluation and management framework in context-enabled vehicular ad-hoc networks. IEEE Access. https://doi.org/10.1109/ACCESS.2018.2837887
Investigation of indecent images of children cases: Challenges and suggestions collected from the trenches.
Franqueira, Virginia N. L., Bryce, Joanne, Al Mutawa, Noora and Marrington, Andrew 2017. Investigation of indecent images of children cases: Challenges and suggestions collected from the trenches. Digital Investigation. https://doi.org/10.1016/j.diin.2017.11.002
Parallel Monte Carlo search for Hough Transform.
Lopes, Raul, Franqueira, Virginia N. L., Reid, Ivan D. and Hobson, Peter 2017. Parallel Monte Carlo search for Hough Transform. Journal of Physics: Conference Series. https://doi.org/10.1088/1742-6596/898/7/072052
Verifiable public key encryption scheme with equality test in 5G networks
Xu, Yan, Wang, Ming, Zhong, Hong, Cui, Jie, Liu, Lu and Franqueira, Virginia N. L. 2017. Verifiable public key encryption scheme with equality test in 5G networks. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2716971
RTS: road topology-based scheme for traffic condition estimation via vehicular crowdsensing
Shao, Lu, Wang, Cheng, Liu, Lu and Jiang, Changjun 2016. RTS: road topology-based scheme for traffic condition estimation via vehicular crowdsensing. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.3778
Achieving green IT using VDI in cyber physical society
Liu, Lu, DaSilva, Don-Anthony, Antonopoulos, Nikolaos, Ding, Zhijun and Zhan, Yongzhao 2013. Achieving green IT using VDI in cyber physical society. Journal of Internet Technology.
Special issue on cyberharassment investigation: Advances and trends
Bryce, Joanne, Franqueira, Virginia N. L. and Marrington, Andrew 2016. Special issue on cyberharassment investigation: Advances and trends. Journal of Digital Forensics, Security and Law (JDFSL).
Faith in vehicles: A set of evaluation criteria for trust management in vehicular ad-hoc network
Ahmad, F., Hall, Jordan, Adnane, Asma and Franqueira, Virginia N. L. 2017. Faith in vehicles: A set of evaluation criteria for trust management in vehicular ad-hoc network. IEEE.
Internet-of-Things-based smart cities: Recent advances and challenges.
Mehmood, Yasir, Ahmad, F., Yaqoob, Ibrar, Adnane, Asma, Imran, Muhammad and Guizani, Sghaier 2017. Internet-of-Things-based smart cities: Recent advances and challenges. IEEE Communications Magazine. https://doi.org/10.1109/MCOM.2017.1600514
Event detection and user interest discovering in social media data streams
Shi, Lei-lei, Liu, Lu, Wu, Yan, Jiang, Liang and Hardy, J. 2017. Event detection and user interest discovering in social media data streams. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2675839
Collaborative actuation of wireless sensor and actuator networks for the agriculture industry.
Bai, Xingzhen, Liu, Lu, Cao, Maoyong, Panneerselvam, J., Sun, Qiao and Wang, Haixia 2017. Collaborative actuation of wireless sensor and actuator networks for the agriculture industry. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2725342
InOt-RePCoN: Forecasting user behavioural trend in large-scale cloud environments.
Panneerselvam, J., Liu, Lu and Antonopoulos, Nikolaos 2017. InOt-RePCoN: Forecasting user behavioural trend in large-scale cloud environments. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2017.05.022
Mobilouds: An energy efficient MCC collaborative framework with extended mobile participation for next generation networks
Panneerselvam, J., Hardy, J., Liu, Lu, Yuan, Bo and Antonopoulos, Nikolaos 2017. Mobilouds: An energy efficient MCC collaborative framework with extended mobile participation for next generation networks. IEEE Access. https://doi.org/10.1109/ACCESS.2016.2602321
Digital video source identification based on green-channel photo response non-uniformity (G-PRNU)
Al-Athamneh, Mohammad, Kurugollu, Fatih, Crookes, Danny and Farid, Mohsen 2016. Digital video source identification based on green-channel photo response non-uniformity (G-PRNU). https://doi.org/10.5121/csit.2016.61105
Big-Data analytics and cloud computing: Theory, algorithms and applications
Hill, Richard, Trovati, Marcello, Liu, Lu, Anjum, Ashiq and Zhu, Shao Ying 2015. Big-Data analytics and cloud computing: Theory, algorithms and applications. Springer.
A critical comparative evaluation on DHT-based peer-to-peer search algorithms
Betts, Alexander, Liu, Lu, Li, Zhiyuan and Antonopoulos, Nikolaos 2014. A critical comparative evaluation on DHT-based peer-to-peer search algorithms. International Journal of Embedded Systems. https://doi.org/10.1504/IJES.2014.063823
Enhanced timeline analysis for digital forensic investigations
Inglot, Bartosz and Liu, Lu 2014. Enhanced timeline analysis for digital forensic investigations. Information Security Journal: A Global Perspective. https://doi.org/10.1080/19393555.2014.897401
An integrated approach to developing self-adaptive software in open environments
Mao, Xinjun, Dong, Menggao, Liu, Lu and Wang, Huaiming 2014. An integrated approach to developing self-adaptive software in open environments. Journal of Information Science and Engineering.
CloudMon: a resource-efficient IaaS cloud monitoring system based on networked intrusion detection system virtual appliances
Li, Bo, Li, Jianxin and Liu, Lu 2015. CloudMon: a resource-efficient IaaS cloud monitoring system based on networked intrusion detection system virtual appliances. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.3166
An investigation of security trends in personal wireless networks
Liu, Lu, Stimpson, Thomas, Antonopoulos, Nikolaos, Ding, Zhijun and Zhan, Yongzhao 2013. An investigation of security trends in personal wireless networks. Wireless Personal Communications. https://doi.org/10.1007/s11277-013-1386-3
Performance evaluation and simulation of peer-to-peer protocols for Massively Multiplayer Online Games
Liu, Lu, Jones, Andrew, Antonopoulos, Nikolaos, Ding, Zhijun and Zhan, Yongzhao 2013. Performance evaluation and simulation of peer-to-peer protocols for Massively Multiplayer Online Games. Multimedia Tools and Applications. https://doi.org/10.1007/s11042-013-1662-y
Virtual vignettes: the acquisition, analysis, and presentation of social network data
Howden, Chris, Liu, Lu, Li, Zhiyuan, Li, Jianxin and Antonopoulos, Nikolaos 2014. Virtual vignettes: the acquisition, analysis, and presentation of social network data. Science China Information Sciences. https://doi.org/10.1007/s11432-014-5069-9
An Efficient SDN load balancing scheme based on variance analysis for massive mobile users
Zhong, Hong, Lin, Qunfeng, Cui, Jie, Shi, Runhua and Liu, Lu 2015. An Efficient SDN load balancing scheme based on variance analysis for massive mobile users. Mobile Information Systems. https://doi.org/10.1155/2015/241732
An adaptive secure communication framework for mobile peer-to-peer environments using Bayesian games
Li, Zhiyuan, Liu, Lu, Chen, Rulong and Bi, Jun-Lei 2015. An adaptive secure communication framework for mobile peer-to-peer environments using Bayesian games. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-015-0376-5
Cloud BI: Future of business intelligence in the Cloud
Al-Aqrabi, Hussain, Liu, Lu, Hill, Richard and Antonopoulos, Nikolaos 2014. Cloud BI: Future of business intelligence in the Cloud. Journal of Computer and System Sciences. https://doi.org/10.1016/j.jcss.2014.06.013
Toward a flexible and fine-grained access control framework for infrastructure as a service clouds
Li, Bo, Li, Jianxin, Liu, Lu and Zhou, Chao 2015. Toward a flexible and fine-grained access control framework for infrastructure as a service clouds. Security and Communication Networks. https://doi.org/10.1002/sec.1216
Dynamic resource discovery based on preference and movement pattern similarity for large-scale social internet of things
Li, Zhiyuan, Chen, Rulong, Liu, Lu and Min, Geyong 2015. Dynamic resource discovery based on preference and movement pattern similarity for large-scale social internet of things. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2015.2451138
An adaptive multilevel indexing method for disaster service discovery
Wu, Yan, Yan, Chun Gang, Liu, Lu, Ding, Zhijun and Jiang, Changjun 2014. An adaptive multilevel indexing method for disaster service discovery. IEEE Transactions on Computers. https://doi.org/10.1109/TC.2014.2378273
A socioecological model for advanced service discovery in machine-to-machine communication networks
Liu, Lu, Antonopoulos, Nikolaos, Zheng, Minghui, Zhan, Yongzhao and Ding, Zhijun 2016. A socioecological model for advanced service discovery in machine-to-machine communication networks. ACM Transactions on Embedded Computing Systems. https://doi.org/10.1145/2811264
Privacy and trust in smart camera sensor networks
Adnane, Asma and Loughlin, Michael 2015. Privacy and trust in smart camera sensor networks. ARES. https://doi.org/10.1109/ARES.2015.31
Forensically-sound analysis of security risks of using local password managers
Gray, Joshua, Franqueira, Virginia N. L. and Yu, Yijun 2016. Forensically-sound analysis of security risks of using local password managers. IEEE Computer Society. https://doi.org/10.1109/REW.2016.034
Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis
Al Mutawa, Noora, Bryce, Joanne, Marrington, Andrew and Franqueira, Virginia N. L. 2016. Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis. Digital Investigation. https://doi.org/10.1016/j.diin.2016.01.012
To flip or not to flip: a critical interpretive synthesis of flipped teaching
Franqueira, Virginia N. L. and Tunnicliffe, Peter 2015. To flip or not to flip: a critical interpretive synthesis of flipped teaching. in: Springer International Publishing.
Factors influencing digital forensic investigations: Empirical evaluation of 12 years of Dubai police cases
Al Awadhi, Ibtesam, Read, Janet C., Marrington, Andrew and Franqueira, Virginia N. L. 2015. Factors influencing digital forensic investigations: Empirical evaluation of 12 years of Dubai police cases. Journal of Digital Forensics, Security and Law (JDFSL).
RVLBPNN: A workload forecasting model for smart cloud computing
Lu, Yao, Panneerselvam, J., Liu, Lu and Wu, Yan 2016. RVLBPNN: A workload forecasting model for smart cloud computing. Scientific Programming. https://doi.org/10.1155/2016/5635673
CCLBR: Congestion control-based load balanced routing in unstructured P2P systems
Shen, Xiang-Jun, Chang, Qing, Liu, Lu, Panneerselvam, J. and Zha, Zheng-Jun 2016. CCLBR: Congestion control-based load balanced routing in unstructured P2P systems. IEEE Systems Journal. https://doi.org/10.1109/JSYST.2016.2558515
An efficient algorithm for partially matched services in internet of services
Ahmed, Mariwan, Liu, Lu, Hardy, J., Yuan, Bo and Antonopoulos, Nikolaos 2016. An efficient algorithm for partially matched services in internet of services. Personal and Ubiquitous Computing. https://doi.org/10.1007/s00779-016-0917-9
A systematic approach for cyber security in vehicular networks
Ahmad, F., Adnane, Asma and Franqueira, Virginia N. L. 2016. A systematic approach for cyber security in vehicular networks. Journal of Computer and Communications. https://doi.org/10.4236/jcc.2016.416004
A novel context-based risk assessment approach in vehicular networks
Ahmad, F. and Adnane, Asma 2016. A novel context-based risk assessment approach in vehicular networks. IEEE. https://doi.org/10.1109/WAINA.2016.60
Evaluation platform for trust in vehicular ad hoc networks
Ahmad, F. and Adnane, Asma 2016. Evaluation platform for trust in vehicular ad hoc networks.
Introduction to special issue on risk and trust in embedded critical systems
Rossebø, Judith E. Y., Houmb, Siv H., Georg, Geri, Franqueira, Virginia N. L. and Serpanos, Dimitrios 2014. Introduction to special issue on risk and trust in embedded critical systems. ACM Transactions on Embedded Computing Systems. https://doi.org/10.1145/2659008
Efficient computation of hashes
Lopes, Raul, Franqueira, Virginia N. L. and Hobson, Peter 2014. Efficient computation of hashes. Journal of Physics: Conference Series. https://doi.org/10.1088/1742-6596/513/3/032042
Behavioural evidence analysis applied to digital forensics: An empirical analysis of child pornography cases using P2P networks
Mutawa, Noora Al, Bryce, Joanne, Franqueira, Virginia N. L. and Marrington, Andrew 2015. Behavioural evidence analysis applied to digital forensics: An empirical analysis of child pornography cases using P2P networks. IEEE Computer Society. https://doi.org/10.1109/ARES.2015.49
Challenges of data provenance for cloud forensic investigations
Katilu, Victoria M., Franqueira, Virginia N. L. and Angelopoulou, Olga 2015. Challenges of data provenance for cloud forensic investigations. IEEE Computer Society. https://doi.org/10.1109/ARES.2015.54
Automated analysis of security requirements through risk-based argumentation
Yu, Yijun, Franqueira, Virginia N. L., Than Tun, Thein, Wieringa, Roel J. and Nuseibeh, Bashar 2015. Automated analysis of security requirements through risk-based argumentation. Journal of Systems and Software. https://doi.org/10.1016/j.jss.2015.04.065
Evaluation criterias for trust management in Vehicular Ad-hoc Networks (VANETs)
Alriyami, Qasim, Adnane, Asma and Smith, Anthony 2014. Evaluation criterias for trust management in Vehicular Ad-hoc Networks (VANETs). IEEE.
Vehicular cloud networks: Architecture, applications and security issues
Ahmad, F., Kazim, M., Adnane, Asma and Abir, Awad 2015. Vehicular cloud networks: Architecture, applications and security issues. IEEE. https://doi.org/10.1109/UCC.2015.101
Vehicular cloud networks: Architecture and security
Ahmad, F., Kazim, M. and Adnane, Asma 2015. Vehicular cloud networks: Architecture and security. in: Springer.
Design of trust based context aware routing protocol in vehicular networks
Ahmad, F. and Adnane, Asma 2015. Design of trust based context aware routing protocol in vehicular networks.
A critical review of the routing protocols in opportunistic networks
Panneerselvam, J., Atojoko, Anthony, Smith, K., Liu, Lu and Antonopoulos, Nikolaos 2014. A critical review of the routing protocols in opportunistic networks. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems. https://doi.org/10.4108/inis.1.1.e6
iMIG: Toward an adaptive live migration method for KVM virtual machines
Li, Jianxin, Zhao, Jieyu Zhao, Li, Yi, Cui, Lei, Li, Bo, Liu, Lu and Panneerselvam, J. 2014. iMIG: Toward an adaptive live migration method for KVM virtual machines. The Computer Journal. https://doi.org/10.1093/comjnl/bxu065
Achieving dynamic load balancing through mobile agents in small world P2P networks
Shen, Xiang-Jun, Liu, Lu, Zha, Zheng-Jun, Gu, Pei-Ying, Jiang, Zhong-Qiu, Chen, Ji-Ming and Panneerselvam, J. 2014. Achieving dynamic load balancing through mobile agents in small world P2P networks. Computer Networks. https://doi.org/10.1016/j.comnet.2014.05.003
Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework
Ikram, Ahsan, Anjum, Ashiq, Hill, Richard, Antonopoulos, Nikolaos, Liu, Lu and Sotiriadis, Stelios 2013. Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.3131
Trust-Based countermeasures for securing OLSR protocol
Adnane, Asma, Bidan, Christophe and de Sousa Júnior, Rafael Timóteo 2009. Trust-Based countermeasures for securing OLSR protocol. ," IEEE International Conference on Computational Science and Engineering. https://doi.org/10.1109/CSE.2009.130
Autonomic trust reasoning enables misbehavior detection in OLSR
Adnane, Asma, de Sousa Júnior, Rafael Timóteo, Bidan, Christophe and Mé, Ludovic 2008. Autonomic trust reasoning enables misbehavior detection in OLSR. ”. In Proceedings of the 2008 ACM symposium on Applied computing (SAC '08). ACM. https://doi.org/10.1145/1363686.1364173
Multipath optimized link state routing for mobile ad hoc networks
Yi, Jiazi, Adnane, Asma, David, Sylvain and Parrein, Benoît 2011. Multipath optimized link state routing for mobile ad hoc networks. ad hoc networks. https://doi.org/10.1016/j.adhoc.2010.04.007
Trust-based security for the OLSR routing protocol
Adnane, Asma, Bidan, Christophe and de Sousa Júnior, Rafael Timóteo 2013. Trust-based security for the OLSR routing protocol. Computer Communications. https://doi.org/10.1016/j.comcom.2013.04.003
Energy performance assessment of virtualization technologies using small environmental monitoring sensors
Liu, Lu, Masfary, Osama and Antonopoulos, Nikolaos 2012. Energy performance assessment of virtualization technologies using small environmental monitoring sensors. Sensors. https://doi.org/10.3390/s120506610
Adaptive service discovery on service-oriented and spontaneous sensor systems
Liu, Lu, Xu, Jie, Antonopoulos, Nikolaos, Li, Jianxin and Wu, Kaigu 2012. Adaptive service discovery on service-oriented and spontaneous sensor systems. Adhoc & Sensor Wireless Networks.
Dynamic service integration for reliable and sustainable capability provision
Liu, Lu, Xu, Jie, Russell, Duncan, Davies, John K., Webster, David, Luo, Zongyang and Venters, Colin 2010. Dynamic service integration for reliable and sustainable capability provision. International Journal of Systems Science. https://doi.org/10.1080/00207721003774736
Fault-tolerant peer-to-peer search on small-world networks
Liu, Lu, Antonopoulos, Nikolaos and Mackin, Stephen 2007. Fault-tolerant peer-to-peer search on small-world networks. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2007.03.002
Managing peer-to-peer networks with human tactics in social interactions
Liu, Lu, Antonopoulos, Nikolaos and Mackin, Stephen 2007. Managing peer-to-peer networks with human tactics in social interactions. The Journal of Supercomputing. https://doi.org/10.1007/s11227-007-0156-y
Distributed service integration for disaster monitoring sensor systems
Liu, Lu, Antonopoulos, Nikolaos, Xu, Jie, Webster, David and Wu, Kaigu 2011. Distributed service integration for disaster monitoring sensor systems. IET Communications. https://doi.org/10.1049/iet-com.2010.0630
CyberGuarder: a virtualization security assurance architecture for green cloud computing
Li, Jianxin, Li, Bo, Wo, Tianyu, Hu, Chunming, Huai, Jinpeng, Liu, Lu and Lam, K.P. 2012. CyberGuarder: a virtualization security assurance architecture for green cloud computing. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2011.04.012
Editorial: Special issue on dependable peer-to-peer systems
Liu, Lu and Xu, Jie 1931. Editorial: Special issue on dependable peer-to-peer systems. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-009-0065-3
Modelling and simulation of network enabled capability on service-oriented architecture
Liu, Lu, Russell, Duncan, Xu, Jie, Webster, David, Luo, Zongyang, Venters, Colin and Davies, John K. 2009. Modelling and simulation of network enabled capability on service-oriented architecture. Simulation Modelling Practice and Theory. https://doi.org/10.1016/j.simpat.2009.06.012
CyberLiveApp: a secure sharing and migration approach for live virtual desktop applications in a cloud environment
Li, Jianxin, Jia, Yu, Liu, Lu and Wo, Tianyu 2011. CyberLiveApp: a secure sharing and migration approach for live virtual desktop applications in a cloud environment. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2011.08.001
Efficient resource discovery in self-organized unstructured peer-to-peer networks
Liu, Lu, Antonopoulos, Nikolaos, Mackin, Stephen, Xu, Jie and Russell, Duncan 2008. Efficient resource discovery in self-organized unstructured peer-to-peer networks. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.1329
Efficient and scalable search on scale-free P2P networks
Liu, Lu, Xu, Jie, Russell, Duncan, Townend, Paul and Webster, David 2009. Efficient and scalable search on scale-free P2P networks. Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-008-0023-5
HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree
Li, Jianxin, Liu, Xudong, Liu, Lu, Sun, Dazhi and Li, Bo 2011. HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree. Telecommunication Systems. https://doi.org/10.1007/s11235-011-9648-4
Dynamic authentication for cross-realm SOA-based business processes
Xu, Jie, Zhang, Dacheng, Li, Xianxian and Liu, Lu 2010. Dynamic authentication for cross-realm SOA-based business processes. IEEE Transactions on Services Computing. https://doi.org/10.1109/TSC.2010.33
Dot-base62x: building a compact and user-friendly text representation scheme of ipv6 addresses for cloud computing
Liu, Zhenxing, Liu, Lu, Hardy, J., Anjum, Ashiq, Hill, Richard and Antonopoulos, Nikolaos 2012. Dot-base62x: building a compact and user-friendly text representation scheme of ipv6 addresses for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications. https://doi.org/10.1186/2192-113X-1-3