• Publications
  • Influence
A Connected and Autonomous Vehicle Reference Architecture for Attack Surface Analysis
TLDR
A reference architecture using a hybrid Functional-Communication viewpoint is proposed for attack surface analysis of CAVs, including the Devices, Edge and Cloud systems CAVs interact with, and how attack trees can be used to understand the attack surface of CAV systems. Expand
Fake source‐based source location privacy in wireless sensor networks
TLDR
This work is the first to investigate the theoretical underpinnings of the fake source technique, and shows that fake sources can provide a high level of SLP. Expand
Hybrid online protocols for source location privacy in wireless sensor networks
TLDR
This paper provides a hybrid online algorithm that uses directed random walks for the fake sources allocation strategy to reduce energy usage and shows that DynamicSPR provides a similar level of SLP as when parameters are optimised at compile-time, with a lower number of messages sent. Expand
A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks
TLDR
A novel dynamic fake sources-based algorithm for SLP is developed and it is shown that the algorithm provides state-of-the-art levels of location privacy under practical operational assumptions. Expand
Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks
TLDR
The objective of this paper is to investigate the novel problem of developing a TDMA MAC schedule that can provide SLP, and to develop a 3-stage distributed algorithm that transforms an initial DAS algorithm into a corresponding SLP-aware schedule against a specific class of eavesdroppers. Expand
Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources
TLDR
A novel formalisation of the source location privacy problem is provided, it is proved to be NP-complete, and a heuristic is provided that yields an optimal level of privacy under appropriate parameterisation. Expand
A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks
TLDR
A distributed version of the SLP problem is developed, which uses both spatial and temporal redundancy to provide SLP and results from extensive simulations indicate a 1% capture ratio is achievable as a trade-off for an increase in the delivery latency. Expand
Towards fake sources for source location privacy in wireless sensor networks with multiple sources
TLDR
This paper analyzes a representative fake source algorithm in the context of multiple sources, presenting simulation results that demonstrate the shortcomings of the approach and identifying the underlying limitations to pave the way for the development of algorithms capable of accounting for multiple sources. Expand
A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks
TLDR
This paper proposes a methodology where SLP protocols are first profiled to capture their performance under various protocol configurations, and presents a novel decision theoretic procedure for selecting the most appropriate SLP routing algorithm for the application and network under investigation. Expand
Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks
TLDR
It is conjecture that similar traffic perturbation to altering the routing protocol can be achieved at the link layer through assignment of time slots to nodes. Expand
...
1
2
3
4
...