Skip to main content

Research Repository

Advanced Search

All Outputs (10)

Review of Networking and Tangible Security Techniques for Domestic IoT Devices and Initial Ideas (2020)
Working Paper
Zakhary, S., Sunil, N., & Mcauley, D. Review of Networking and Tangible Security Techniques for Domestic IoT Devices and Initial Ideas

The number of connected devices including Internet of Things (IoTs) on the Internet is growing fast. According to recent Gartner research, the estimated number of IoT devices is 5.8 billion in 2020 (Gartner, 2019). The countries that are leading the... Read More about Review of Networking and Tangible Security Techniques for Domestic IoT Devices and Initial Ideas.

Modelling Urban Housing Stocks for Building Energy Simulation using CityGML EnergyADE (2019)
Journal Article
Rosser, J. F., Long, G., Zakhary, S., Boyd, D. S., Mao, Y., & Robinson, D. (2019). Modelling Urban Housing Stocks for Building Energy Simulation using CityGML EnergyADE. ISPRS International Journal of Geo-Information, 8(4), Article 163. https://doi.org/10.3390/ijgi8040163

Understanding the energy demand of a city’s housing stock is an important focus for local and national administrations to identify strategies for reducing carbon emissions. Building energy simulation offers a promising approach to understand energy u... Read More about Modelling Urban Housing Stocks for Building Energy Simulation using CityGML EnergyADE.

Predicting residential building age from map data (2018)
Journal Article
Rosser, J., Boyd, D., Long, G., Zakhary, S., Mao, Y., & Robinson, D. (2019). Predicting residential building age from map data. Computers, Environment and Urban Systems, 73, 56-67. https://doi.org/10.1016/j.compenvurbsys.2018.08.004

The age of a building influences its form and fabric composition and this in turn is critical to inferring its energy performance. However, often this data is unknown. In this paper, we present a methodology to automatically identify the construction... Read More about Predicting residential building age from map data.

On Location-Privacy in Opportunistic Mobile Networks, A Survey (2017)
Journal Article
Zakhary, S., & Benslimane, A. (2018). On Location-Privacy in Opportunistic Mobile Networks, A Survey. Journal of Network and Computer Applications, 103, 157-170. https://doi.org/10.1016/j.jnca.2017.10.022

In recent years, networked devices spread into different activities in our daily lives enabling many innovative applications. These applications were not only computationally-intelligent on their own, but also enabled collection and sharing of users'... Read More about On Location-Privacy in Opportunistic Mobile Networks, A Survey.

Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks (2013)
Journal Article
Zakhary, S., Radenkovic, M., & Benslimane, A. (2014). Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks. IEEE Transactions on Vehicular Technology, 63(2), 893-906. https://doi.org/10.1109/TVT.2013.2279671

This paper proposes a novel fully distributed and collaborative k-anonymity protocol (LPAF) to protect users’ location information and ensure better privacy while forwarding queries/replies to/from untrusted location-based service (LBS) over opportun... Read More about Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks.

Flexible and dynamic network coding for adaptive data transmission in DTNs (2012)
Conference Proceeding
Radenkovic, M., Zakhary, S., Radenkovic, M., & Zakhary, S. (2012). Flexible and dynamic network coding for adaptive data transmission in DTNs. In Wireless Communications and Mobile Computing Conference (IWCMC), 8th International (567--573). https://doi.org/10.1109/IWCMC.2012.6314266

Existing network coding approaches for Delay-Tolerant Networks (DTNs) do not detect and adapt to congestion in the network. In this paper we describe CafNC (Congestion aware forwarding with Network Coding) that combines adaptive network coding and a... Read More about Flexible and dynamic network coding for adaptive data transmission in DTNs.

Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments (2010)
Conference Proceeding
Radenkovic, M., Zakhary, S. R., & Radenkovic, M. (2010). Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments. In 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS) (161--167). https://doi.org/10.1109/WONS.2010.5437117

This paper is concerned with fully distributed reputation-based mechanisms that improve security in MANETS. We introduce a number of optimisations to the current reputation schemes used in MANETs such as selective deviation tests and adaptive expirat... Read More about Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments.