Maode Ma

Maode Ma
  • Doctor of Philosophy
  • Professor (Full) at Qatar University

About

460
Publications
44,606
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,762
Citations
Introduction
Prof. Maode Ma, a Fellow of IET, received his Ph.D. from the Department of Computer Science at the Hong Kong University of Science and Technology in 1999. Now, Prof. Ma is a research professor at the College of Engineering at Qatar University. He has extensive research interests including network security and wireless networking. He has over 510 international academic publications including over 260 journal papers and about 250 conference papers. His publication has received over 11000 citations
Current institution
Qatar University
Current position
  • Professor (Full)

Publications

Publications (460)
Article
Full-text available
With the continuous development of deep learning, U‐Net networks, as an encoder‐decoder U‐shaped network architecture based on skip connections, have become a popular structure for various medical image segmentation applications in recent years. However, traditional medical segmentation networks face severe challenges when dealing with complex scen...
Conference Paper
Marine terminal vessel management demands a delicate balance between berth allocation, cost savings, and departure delays. A research need is filled by combining sensing, estimation, planning, and scheduling to improve coastal vessel management and navigation. Traditional techniques have treated these functions separately, yielding poor results....
Article
Full-text available
A Flying Ad Hoc Network (FANET) is a self-organizing wireless network comprised of clusters of Unmanned Aerial Vehicles (UAVs) or drones that communicate while nearby. FANETs are increasingly used in a variety of applications, including smart ports, delivery of products, construction, monitoring of the environment and climate, and military surveill...
Article
Full-text available
Vehicle Ad-hoc Networks (VANETs) have experienced significant development in recent years, playing a crucial role in enhancing the driving experience by enabling safer and more efficient inter-vehicle interactions through information exchange. Vehicle-to-Vehicle (V2V) communication is particularly vital as it not only helps to prevent collisions an...
Article
Full-text available
Low Earth orbit (LEO) communication satellite constellation provides network service to remote areas without terrestrialnetwork coverage. In sparsely populated areas, the deployment of ground stations is also scarce, due to geographic constraints and the lack of terrestrial backhaul. Due to the constant orbiting of the satellite constellation, loca...
Article
Full-text available
With the refinement and development of the Vehicle to Everything (V2X) concept, its security issues have gradually come to the fore, revealing many security risks and increasing security requirements for V2X, and many protective measures have likewise emerged. The article first introduces the development history of the past Internet of Vehicles(IoV...
Preprint
Full-text available
With the wide and rapid development of wireless sensor networks (WSNs), current WSNs have become more and more complex with lager capacity, which need emerging technologies to support. For example, artificial intelligence (AI) technology is required to deal with huge data transmission and parameter optimization. Big data and data mining technique i...
Preprint
Vehicle Ad-hoc Networks (VANETs) have experienced significant development in recent years, playing a crucial role in enhancing the driving experience by enabling safer and more efficient inter-vehicle interactions through information exchange. Vehicle-to-vehicle (V2V) communication is particularly vital as it not only helps to prevent collisions an...
Article
Full-text available
The distributed authentication of a large number of resource-constrained power terminal devices (PTDs) is crucial for ensuring the security of the power IoT communication. However, existing solutions are inadequate in terms of security (such as vulnerability to single point failures or insider attacks) and communication costs, which do not meet the...
Data
Date: May 12, 2024 Paper ID: NUSTPAS_2024_114 Dear Authors, On behalf of the NUSTPAS_2024 Scientific Committee, and based on our (Reviewers' Evaluation, Scientific Committee Decision, and Guest Editors' Approval), we are pleased to inform you that your paper entitled: Vessel Berthing System Using Internet of Things (IoT) for Smart Port Writte...
Article
Full-text available
Emerging from the field of microgrids is an efficient and persuasive transitional technology with great promise for easing energy crises, environmental worries, and economic limitations in seaports. When it comes to high-performance ports, this technology becomes even more important. One example is smart ports, which use state-of-the-art ICT applic...
Article
Full-text available
The Named Data Networking (NDN) architecture, known for its caching strategies and name‐based routing, is an exemplary paradigm for content distribution across Internet of Things (IoT) devices. In the environment of NDN‐IoT, there is an urgent demand for a lightweight signature authentication scheme suitable for terminal devices to ensure the integ...
Article
Full-text available
In the realm of the fifth-generation (5G) wireless cellular networks, renowned for their dense connectivity, there lies a substantial facilitation of a myriad of Internet of Things (IoT) applications, which can be supported by the massive machine-type communication (MTC) technique, a fundamental communication framework. In some scenarios, a large n...
Article
Full-text available
The rapid growth of edge devices and mobile applications has driven the adoption of edge computing to handle computing tasks closer to end-users. However, the heterogeneity of edge devices and their limited computing resources raise challenges in the efficient allocation of computing resources to complete services with different characteristics and...
Article
Full-text available
Federated Learning (FL), as an emerging paradigm in distributed machine learning, has received extensive research attention. However, few works consider the impact of device mobility on the learning efficiency of FL. In fact, it is detrimental to the training result if heterogeneous clients undergo migration or are in an offline state during the gl...
Article
Full-text available
Named Data Networking (NDN) is a promising network architecture that differs from the traditional TCP/IP network, as it focuses on data rather than the host. A new secure model is required to provide the data-oriented trust instead of the host-oriented trust. This paper proposes a new secure solution in the NDNs named Secure Mechanism supported by...
Article
Full-text available
With the increasing demand for a digital world, the Industrial Internet of Things (IIoT) is growing rapidly across various industries. In manufacturing, particularly in Industry 4.0, the IIoT assumes a vital role. It encompasses many devices such as sensing devices, application servers, users, and authentication servers within workshop settings. Th...
Article
Full-text available
In the process of vehicles transitioning from conventional means of transportation to mobile computing platforms, ensuring secure communication and data exchange is of paramount importance. Consequently, identity authentication has emerged as a crucial security measure. Specifically, effective authentication is required prior to the communication b...
Article
Blockchain systems encompass many distinct and autonomous entities, each utilizing its own self-contained identity authentication algorithm. Unlike identity authentication within a singular blockchain, cross-chain scenarios demand special attention due to their pivotal role in enabling the acknowledgment of users’ identities across diverse domains....
Article
Vehicular Ad Hoc Networks (VANETs) play a critical role in enabling communication among intelligent vehicles, yet their dynamic and decentralized nature makes them highly vulnerable to cyber-attacks. Traditional Intrusion Detection Systems (IDSs) provide limited defense against these evolving threats, as they rely on static rules or machine learnin...
Article
Full-text available
With the gradual maturity of Smart Grid (SG), security challenges become the most important issues that need to be addressed urgently. In recent years, many schemes adopt mutual authentication and key agreement to ensure secure communication in SG. However, most existing methods have their own shortcomings in either security or efficiency which mak...
Preprint
Full-text available
p>The Internet of Things (IoT) is today’s rapidly growing technology that consists of a massive number of smart devices. The advent of IoT has brought about huge prospects of innovation and opportunities on the domestic as well as industry levels. However, there are vulnerabilities and weaknesses of IoT that inflame concerns about security and priv...
Article
Full-text available
Modern smart grids are built based on top of advanced computing and networking technologies, where condition monitoring relies on secure cyberphysical connectivity. Over the network infrastructure, transported data containing confidential information, must be protected as smart grids are vulnerable and subject to various cyberattacks. Various machi...
Article
Full-text available
With the development of artificial intelligence and human-computer interaction, performance of man-machine voice dialogue system is becoming better and better. We proposed a new watermark detection method based on non-parametric model to mute machine voice when there are two or more robots around. We took a random sequence composed of 1 and − 1 as...
Article
Full-text available
Smart grid (SG) has attracted great attention for its reliability, sustainability, and efficiency, which uses artificial intelligence technology, automation technology, and Internet of Things (IoT) technology. In SG, it is crucial to set up a secure communication between an Aggregator (AG) and a Smart Meter (SM) to achieve mutual authentication and...
Article
Low Earth orbit (LEO) satellite constellations support intelligent driving applications in areas without terrestrial network coverage. As the LEO-satellite integrated vehicular network experiences dual mobility of satellites and vehicles, the mainstream IP-based mobility management protocols may not adapt to the dynamic network topology and violate...
Article
Many IoT applications require users to share their devices’ location, and enhanced privacy-protection means sharing location anonymously, unlinkably and without relying on any administrators. But under such protection, it is difficult to trust shared location data, which may be from unregistered devices or from the same one’s multiple logins or fro...
Article
Full-text available
The capacity of highways has been an ever-present constraint in the 21st century, bringing about the issue of safety with greater likelihoods of traffic accidents occurring. Furthermore, recent global oil prices have inflated to record levels. A potential solution lies in vehicular platooning, which has been garnering attention, but its deployment...
Article
Full-text available
Named data networking (NDN) has been viewed as a promising future Internet architecture due to its data-centric design. It requires a new security model that is orienting data but not devices. In this paper, an advanced hierarchical identity-based security mechanism by blockchain (AHISM-B) is to be proposed for the NDN networks. On one hand, the hi...
Article
Edge intelligence (EI)‐enabled cyber‐physical system (CPS) is emerging as a new and promising methodology with the development of the Internet of Things (IoT) and smart devices, which enables a large class of applications. Edge enabled CPS has emerged with the potential to change our lives, and is also raising challenging research issues due to the...
Article
In the Internet of Vehicle (IoV) networks, vehicles exchange periodic Basic Safety Messages (BSMs) containing information regarding speed and position. Safety-critical applications like blind-spot warning and lane change warning systems use the BSMs to ensure the safety of road users. To create chaos in the network, an insider attacker may inject f...
Article
Full-text available
With the gradual maturity of the smart grid (SG), security challenges have become one of the important issues that needs to be addressed urgently. In SG, the identity authentication and key agreement protocol between a smart meter ( S M ) and an aggregator ( A G ) is a prerequisite for both parties to establish a secure communication. Some of the e...
Article
Vehicle Ad Hoc Network (VANET) is one of the most important approaches for intelligent vehicles to communicate under complex road conditions. However, as a VANET is working under wireless and complex conditions, it is under the threat of various malicious attacks. One efficient solution to counter those attacks is the Intrusion Detection System (ID...
Article
Full-text available
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate flows. Traditional methods to identify the malicious flows in Crossfire attacks are rerouting, which is based on statistics. In these existing mechanisms, the identification of malicious flows depends on the IP address. However, the IP address is easy t...
Article
The lack of standardization and the heterogeneous nature of the Internet of Things (IoT) has exacerbated the issue of security and privacy. In literature, to improve security at the network layer of the IoT architecture, the possibility of using Software-Defined Networking (SDN) was explored. SDN is also plagued by network threats that affect conve...
Article
Full-text available
Edge computing enables portable devices to provide smart applications, and the indoor positioning technique offers accurate location-based indoor navigation and personalized smart services. To achieve the high positioning accuracy, an indoor positioning algorithm based on particle filter requires a large number of sample particles to approximate th...
Article
Full-text available
Teaching–learning-based optimization is one of the latest metaheuristic algorithms. TLBO has a simple framework and good global search ability. In addition, TLBO only needs population size and terminal condition for performing search tasks. Given these advantages, TLBO has been used widely since it was proposed. However, TLBO may fall into local op...
Article
Anonymous authentication is widely studied for preserving the privacy of IoT devices. Although attribute-based signature (ABS) schemes can show identity attributes flexibly, letting the private key be generated by someone else is not safe. The computational overhead of traditional anonymous credential schemes based on zero-knowledge proofs (ZKP) is...
Article
Full-text available
The futuristic fifth-generation cellular network (5G) not only supports high-speed internet, but must also connect a multitude of devices simultaneously without compromising network security. To ensure the security of the network, the Third Generation Partnership Project (3GPP) has standardized the 5G Authentication and Key Agreement (AKA) protocol...
Article
Full-text available
Research on audio tampering detection and recovery plays an important role in the field of audio integrity, and authenticity certification. Generally, we use technology of fragile/semi fragile watermarking to detect and recover tampered audio. In this study, a new scheme for watermark embedding, tampering detection, and recovery is proposed. In the...
Article
The Internet of Things (IoT) contains enormous computing resources. How to fully and efficiently use computing power is a very important research issue. This article proposes an active computing (AC) concept toward IoT. AC achieves the computing power integration by the means of actively pulling computing tasks; then a network is established with t...
Chapter
Allowing nearby mobile devices to communicate directly without relaying the data through the conventional cellular network, device-to-device (D2D) communication is expected to improve the overall network efficiency of the 5G network and enable futuristic applications. In recent years, 3GPP has also put D2D communication under the umbrella of Proxim...
Article
Machine Type Communication (MTC) has been emerging for a wide range of applications and services for the Internet of Things (IoT). In some scenarios, a large group of MTC devices (MTCDs) may enter the communication coverage of a new target base station simultaneously. However, the current handover mechanism specified by the Third Generation Partner...
Book
The book is presents the papers presented at the 4th International Conference on Telecommunications and Communication Engineering (ICTCE 2020) held on 4 -6 December, in Singapore. It covers advanced research topics in the field of computer communication and networking organized into the topics of emerging technologies of wireless communication and...
Article
Full-text available
Machine Type Communication (MTC) has been emerging for a wide range of applications and services for the Internet of Things (IoT). In some scenarios, a large group of MTC devices (MTCDs) may enter the communication coverage of a new target base station simultaneously. However, the current handover mechanism specified by the Third Generation Partner...
Article
Cognitive radio (CR) provides an effective solution to meet the huge bandwidth requirements in intelligent transportation systems (ITS), which enables secondary users (SUs) to access the idle spectrum of the primary users (PUs). However, the high mobility of users and real-time service requirements result in the additional transmission collisions a...
Article
The explosive growth of end devices that generate massive amounts of data requires close-proximity computing resources for processing at the network’s edge. Having geographic distributions and limited resources of edge nodes or servers opens several doors for attackers to exploit them primarily to the detriment of deployed services; one of the rece...
Article
In recent years, the world of vehicular communication is in full progress. With the emergence of the fifth-generation (5G) technology, the high bandwidth and low latency features in the 5G vehicle to everything (5G-V2X) network become possible. However, the current 5G mechanism specified by the Third Generation Partnership Project (3GPP) Release 16...
Article
Full-text available
Recently, the development of building a smart city has been inclined rapidly with the help of emerging technologies in 5G and internet of things (IoT). In addition with smart city, concepts of smart traffic systems and smart health are also being developed. Combining the above two, smart navigation system for ambulances is being coined. When critic...
Article
Due to the nature of high mobility and dynamic network topology, Intrusion Detection Systems (IDSs) in Vehicular Ad-hoc Networks (VANETs) face lots of challenges, especially in balancing the accuracy and efficiency of detection. Current researches about the deployment of IDSs in VANETs mainly focus on a tradeoff between the effectiveness and effici...
Article
Device-to-device (D2D) communication is one of the promising features in 5G cellular networks. However, there are also new security challenges such as mutual authentication, device anonymity protection, end-to-end data secrecy, and free-riding attack prevention. Therefore, there is a need to develop an authentication scheme that addresses all these...
Article
Links in vehicular networks are highly dynamic and generally exist only for a limited amount of time. Moreover, data packets are generally transmitted over multiple hops and have diverse latency requirements. The above situations together create a dilemma on the order/priority of the packets to be transmitted. However, the existing channel access m...
Article
The emerge of fifth-generation (5G) wireless networks has started a new era of the development of wireless mobile networks. Security of the 5G wireless networks is the major concern when they are deployed for commercial applications. The third-generation partnership project (3GPP) has specified security functionality of 5G wireless in its standard...
Article
Full-text available
As an emerging concept in the intelligent transportation system (ITS), Opportunistic Autonomous Vehicle Platoon (OAVP) enables autonomous vehicles to self-organize a temporary platoon and travel together. Whereas, electing the platoon leader is a crucial issue to be solved in this scenario. The platoon leader not only suffers from more wind resista...
Article
With the gradual commercialization of the fifth generation (5G) network, the narrowband Internet of Things (NB-IoT) system would have potential and prospective applications in future relying on the infrastructure. Meanwhile predictably, there are several security requirements to be satisfied, including concurrent access authentication for massive d...
Preprint
Full-text available
In this emerging world of connected devices, the need for more computing devices with a focus on delay-sensitive application is critical. In this paper, we propose a priority-queue based Fog computing architecture combined with dynamic scalability of fog devices, which not only reduces the delay experienced by delay-sensitive tasks by categorizing...
Article
Internet public opinion is affected by many factors corresponding to insufficient data in the very short period, especially for emergency events related to the outbreak of coronavirus disease 2019 (COVID-19). To effectively support real-time analysis and accurate prediction, this paper proposes an early warning scheme, which comprehensively conside...
Article
Vehicular named data networking (V-NDN) is a network architecture that combines named data networking (NDN) and vehicular ad hoc networks (VANETs). Due to the high-speed mobility of the on-board unit (OBU) in V-NDNs, topological changes may cause the problem of reverse path breaking for data packets, thus impacting the communication quality of serv...
Article
Full-text available
Machine learning (ML) technology has shown its unique advantages in many fields and has excellent performance in many applications, such as image recognition, speech recognition, recommendation systems, and natural language processing. Recently, the applicability of ML in wireless sensor networks (WSNs) has attracted much attention. As resources ar...
Chapter
With the rapid development of smart transportation, autonomous vehicles (AVs) are becoming one of the most anticipating means of transport. However, as the complexity of autonomous vehicles is increasing, it is intuitive that it would bring along with more possible attacks and higher potential risks. For example, by tampering the in-car sensors or...
Article
The rapidly increasing scale of the Internet Protocol version 6 (IPv6) over Low Power Wireless Personal Area Networks (6LoWPAN) and the limitation of communication range emphasized the importance of handovers. The Proxy Mobile IPv6 (PMIPv6) was designed to manage the mobility of sensing nodes with limited resources, which has specified plenty of cr...
Article
Full-text available
Named data networking(NDN) is one representation and implementation of information-centric networking(ICN) and is considered to be among the most promising designs for the next generation of network architecture. The introduction of NDN into vehicular ad-hoc networks (VANETs) and utilization of its content-centric characteristic to improve data tra...
Article
Full-text available
The precision of insulin dosage is essential in the process of diabetes treatment. The fact is providing precise dosage is almost impossible for clinicians since blood sugar levels are dynamically affected by many factors. Even though some auxiliary dosing systems have been proposed, the required real‐time physical data about the health situation o...

Network

Cited By