BRADFORD SCHOLARS

    • Sign in
    View Item 
    •   Bradford Scholars
    • University of Bradford eTheses
    • Theses
    • View Item
    •   Bradford Scholars
    • University of Bradford eTheses
    • Theses
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of Bradford ScholarsCommunitiesAuthorsTitlesSubjectsPublication DateThis CollectionAuthorsTitlesSubjectsPublication Date

    My Account

    Sign in

    HELP

    Bradford Scholars FAQsCopyright Fact SheetPolicies Fact SheetDeposit Terms and ConditionsDigital Preservation Policy

    Statistics

    Display statistics

    Location based authenticated multi-services group key management for cyber security in high speed broadband wireless multicast communications. Multi-service group key management scheme with location based handover authentication for multi-handoffs participating in multi-group service subscriptions, its performance evaluation and security correctness in high speed broadband wireless multicast communications

    • CSV
    • RefMan
    • EndNote
    • BibTex
    • RefWorks
    Thumbnail
    View/Open
    PhD Thesis (3.093Mb)
    Download
    Publication date
    2015
    Author
    Mapoka, Trust Tshepo
    Supervisor
    Shepherd, Simon J.
    Abd-Alhameed, Raed A.
    Keyword
    Cyber security; Location based user authentication; Handover authentication; Multi-Service Group Key Management (GKM); High speed broadband; Wireless networks; Mobile multicast communication; Mobility management; Domain key distributor (DKD); BAN logic
    Rights
    Creative Commons License
    The University of Bradford theses are licenced under a Creative Commons Licence.
    Institution
    University of Bradford
    Department
    School of Engineering & Informatics
    Awarded
    2015
    
    Metadata
    Show full item record
    Abstract
    Secure information exchanges over cyberspace is on the increase due to the convergence of wireless and mobile access technologies in all businesses. Accordingly, with the proliferation of diverse multicast group service subscriptions that are possible to co-exist within a single broadband network, there is also huge demand by the mobile subscribers to ubiquitously access these services over high speed broadband using their portable devices. Likewise, the Network Providers (NPs) invest hugely in infrastructure deployment to disseminate these services efficiently and concomitantly. Therefore, cyber security in any business is obligatory to restrict access of disseminated services to only authorised personnel. This becomes a vital requirement for a successful commercialisation of exchanged group services. The standard way to achieve cyber security in a wireless mobile multicast communication environment is through confidentiality using Group Key Management (GKM).The existing GKM schemes for secure wireless multicast from literature only target single group service confidentiality; however, the adoption of multiple group service confidentiality in them involve inefficient management of keys that induce huge performance overheads unbearable for real time computing. Therefore, a novel authenticated GKM scheme for multiple multicast group subscriptions known as slot based multiple group key management (SMGKM) is proposed. In the SMGKM, the handovers move across diverse decentralised clusters of homogeneous or heterogeneous wireless access network technologies while participating in multiple group service subscriptions. Unlike the conventional art, the SMGKM advances its security by integrating location based authentication and GKM functions. Both functions are securely offloaded from the Domain Key Distributor (DKD) to the intermediate cluster controllers, Area Key Distributors (AKDs), in a distributed fashion, using the proposed location based authenticated membership list (SKDL). A significant upgrade of fast handoff performance with reduced performance overheads of the SMGKM scheme is achieved. The developed numerical analysis and the simulation results display significant resource economy in terms of reduced rekeying transmission, communication bandwidth and storage overheads while providing enhanced security. The performance of the SMGKM in a high speed environment is also evaluated and has demonstrated that SMGKM outperforms the previous work. Finally, the SMGKM correctness against various attacks is verified using BAN logic, the eminent tool for analysing the widely deployed security protocols. The security analysis demonstrates that SMGKM can counteract the security flaws and redundancies identified in the chosen related art.
    URI
    http://hdl.handle.net/10454/14468
    Type
    Thesis
    Qualification name
    PhD
    Collections
    Theses

    entitlement

     

    Related items

    Showing items related by title, author, creator and subject.

    • Thumbnail

      Optimal Multi-Drug Chemotherapy Control Scheme for Cancer Treatment. Design and development of a multi-drug feedback control scheme for optimal chemotherapy treatment for cancer. Evolutionary multi-objective optimisation algorithms were used to achieve the optimal parameters of the controller for effective treatment of cancer with minimum side effects.

      Hossain, M. Alamgir; Majumder, Md A.A.; Algoul, Saleh (University of BradfordSchool of Computing, Informatics and Media, 2013-01-23)
      Cancer is a generic term for a large group of diseases where cells of the body lose their normal mechanisms for growth so that they grow in an uncontrolled way. One of the most common treatments of cancer is chemotherapy that aims to kill abnormal proliferating cells; however normal cells and other organs of the patients are also adversely affected. In practice, it¿s often difficult to maintain optimum chemotherapy doses that can maximise the abnormal cell killing as well as reducing side effects. The most chemotherapy drugs used in cancer treatment are toxic agents and usually have narrow therapeutic indices, dose levels in which these drugs significantly kill the cancerous cells are close to the levels which sometime cause harmful toxic side effects. To make the chemotherapeutic treatment effective, optimum drug scheduling is required to balance between the beneficial and toxic side effects of the cancer drugs. Conventional clinical methods very often fail to find drug doses that balance between these two due to their inherent conflicting nature. In this investigation, mathematical models for cancer chemotherapy are used to predict the number of tumour cells and control the tumour growth during treatment. A feedback control method is used so as to maintain certain level of drug concentrations at the tumour sites. Multi-objective Genetic Algorithm (MOGA) is then employed to find suitable solutions where drug resistances and drug concentrations are incorporated with cancer cell killing and toxic effects as design objectives. Several constraints and specific goal values were set for different design objectives in the optimisation process and a wide range of acceptable solutions were obtained trading off among different conflicting objectives. Abstract v In order to develop a multi-objective optimal control model, this study used proportional, integral and derivative (PID) and I-PD (modified PID with Integrator used as series) controllers based on Martin¿s growth model for optimum drug concentration to treat cancer. To the best of our knowledge, this is the first PID/I-PD based optimal chemotherapy control model used to investigate the cancer treatment. It has been observed that some solutions can reduce the cancer cells up to nearly 100% with much lower side effects and drug resistance during the whole period of treatment. The proposed strategy has been extended for more drugs and more design constraints and objectives.
    • Thumbnail

      IP multicast receiver mobility using multi-homing in a multi-beam satellite network

      Jaff, Esua K.; Pillai, Prashant; Hu, Yim Fun (2013)
      There are several merits of mobile communication devices having multiple network interfaces as compared to traditional devices with just one interface. Smart phones these days are a true example of a mobile multi-homed communication device with heterogeneous network interfaces. Several solutions are available for unicast applications to provide seamless handover using the multiple interfaces of a multi-homed device in terrestrial networks. However, very little has been done on similar support for IP multicast mobility support for mobile satellite terminals in a ubiquitous multi-beam satellite network. Most of the schemes proposed for handovers in multi-homed devices place a lot of emphasis on maintaining the multi-homed device identity especially when the second interface joins the communication session. This increases complexity in the whole system. The issue of maintaining the multi-homed device identity plus the additional signalling messages involve are neither necessary nor desired in an IP multicast communication handover in a multi-beam satellite scenario. This paper seeks to exploit the group communication features of IP multicast (i.e., the fact that anyone can join or leave a multicast group at any time and from any location) and the multiple interfaces of a mobile Return Channel Satellite Terminal (RCST) to support IP multicast communication during handover when a mobile multi-homed RCST changes its point of attachment to the network from one satellite gateway to another.
    • Thumbnail

      Design, Modelling and Implementation of Several Multi-Standard High Performance Single-Wideband and Multi-Wideband Microwave Planar Filters

      Abd-Alhameed, Raed A.; Noras, James M.; Tu, Yuxiang X. (University of BradfordSchool of Engineering and Informatics, 2016)
      The objectives of this work are to review, investigate and model the microwave planar filters of the modern wireless communication system. The recent main stream of microwave filters are classified and discussed separately. Various microwave filters with detailed applications are investigated in terms of their geometrical structures and operational performances. A comprehensive theoretical study of microwave filters is presented. The main types of microwave filters including the basic low-pass filters such as Butterworth and Chebyshev filters are fully analysed and described in detail. The transformation from low-pass prototype filters to high-pass filters, band-pass filters and band-stop filters are illustrated and introduced. Research work on stepped impedance resonator (SIR) and asymmetric stepped impedance resonator (ASIR) structure is presented. The characteristics of λg/4, λg/2 and λg (λg is the guided wavelength of the fundamental frequency in the free space) type SIR resonators, and the characteristic of asymmetric SIR resonator are categorized and investigated. Based on the content mentioned above, novel multi-standard high performance asymmetric stepped impedance resonator single-wideband and dual-wideband filters with wide stopbands are proposed. The methodologies to realize wide passband and wide stop-band filters are detailed. In addition, multi-standard high performance triplewideband, quadruple-wideband and quint-wideband filters are suggested and studied. The measurement results for all prototype filters agree well with the theoretical predictions and simulated results from Ansoft HFSS software. The featured broad bandwidths over single/multiple applicable frequency bands and the high performances of the proposed filters make them very promising for applications in future multistandard wireless communication.
    DSpace software (copyright © 2002 - 2021)  DuraSpace
    Quick Guide | Contact Us
    Open Repository is a service operated by 
    Atmire NV
     

    Export search results

    The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

    By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

    To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

    After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.