Max Eiza

Max Eiza
  • PhD Electronics & Computer Engineering
  • Senior Lecturer at Liverpool John Moores University

About

42
Publications
23,768
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,248
Citations
Introduction
Dr Max Eiza is a Senior Lecturer in Computer Security at the School of Computer Science and Mathematics, Liverpool John Moores University (LJMU). He received his Ph.D. in Electronic and Computer Engineering from Brunel University London, U.K., in 2015. His research interests include computer and network security, with specific interests in quality-of-service and wireless network security and privacy in Vehicular Networks, Smart Grids, Cloud Computing, and Internet of Things.
Current institution
Liverpool John Moores University
Current position
  • Senior Lecturer
Additional affiliations
April 2016 - present
University of Central Lancashire
Position
  • Lecturer
March 2015 - April 2016
Liverpool John Moores University
Position
  • Research Associate
December 2010 - January 2015
Brunel University London
Position
  • PhD Student

Publications

Publications (42)
Article
Full-text available
In a public service announcement on March 17, 2016, the Federal Bureau of Investigation (FBI) jointly with the Department of Transportation and the National Highway Traffic Safety Administration, released a warning over the increasing vulnerability of motor vehicles to remote exploits. Engine shutdown, disable brakes and door locks are few examples...
Conference Paper
In Wi-Fi networks, Device-to-Device (D2D) communications aim to improve the efficiency of the network by supporting direct communication between users in close proximity. However, in a congested Wi-Fi network, establishing D2D connections through a locally managed self-organising approach will intensify the congestion and reduce the scalability of...
Conference Paper
Vehicle-to-Grid (V2G) networks have emerged as a new communication paradigm between Electric Vehicles (EVs) and the Smart Grid (SG). In order to ensure seamless communications between mobile EVs and the electric vehicle supply equipment, the support of ubiquitous and transparent mobile IP communications is essential in V2G networks. However, enabli...
Article
Vehicular networks are one of the main technologies that will be leveraged by the arrival of the future fifth generation (5G) mobile cellular networks. While scalability and latency are the major drawbacks of IEEE 802.11p and 4G LTE enabled vehicular communications, respectively, the 5G technology is a promising solution to empower the real-time se...
Article
Full-text available
A wide range of services has been developed for Vehicular Ad hoc Networks (VANETs) ranging from safety to infotainment applications. An essential requirement for such services is that they are offered with Quality of Service (QoS) guarantees in terms of service reliability and availability. Searching for feasible routes subject to multiple QoS cons...
Article
Full-text available
The Internet of Things (IoT) has been a major part of many use cases for 5G networks. From several of these use cases, it follows that 5G should be able to support at least one million devices per km2. In this paper, we explain that the 5G radio access schemes as used today cannot support such densities. This issue will have to be solved by 6G. How...
Article
Sharing personal data with service providers is a contentious issue that led to the birth of data regulations such as the EU General Data Protection Regulation (GDPR) and similar laws in the US. Complying with these regulations is a must for service providers. For users, this compliance assures them that their data is handled the way the service pr...
Article
With the growing popularization of the Internet of Vehicles (IoVs), the combination of satellite navigation system and IoVs is also in a state of continuous improvement. In this paper, we present a heterogeneous signcryption scheme with group equality test for IoVs (HSC-GET), which avoids the adversaries existing in the insecure channels to interce...
Article
Full-text available
Vehicular Social Networks (VSNs) have emerged as a new social interaction paradigm, where vehicles can form social networks on the roads to improve the convenience/safety of passengers. VSNs are part of Vehicle to Everything (V2X) services, which is one of the industrial verticals in the coming sixth generation (6G) networks. The lower latency, hig...
Conference Paper
Full-text available
The dawn of near 100% global coverage and Tbps data rates is not far as the six generation (6G) networks official roll out is expected around 2030. To match these expectations, new paradigm shifts in terms of global coverage and utilised spectrum are currently under investigation. Space-Air-Ground Integrated Networks (SAGINs) are envisaged to be an...
Article
Full-text available
This paper proposes a novel trust-based cooperative system to facilitate efficient Wi-Fi network access trading to solve the network congestion problem in a beneficial manner for both service providers and customers. The proposed system enables service providers to improve their users’ application performance through a novel cooperative Access Poin...
Conference Paper
Full-text available
Wi-Fi is still by far the most common and cheapest wireless technology to deliver Internet services to users and digital devices, which are dramatically increasing in terms of quantity and the quality of services they require. As a result, Wi-Fi networks are the most congested wireless technology. This issue incentivised many researchers to propose...
Article
Full-text available
This paper aims to examine the challenges of preventing internal identity theft related crimes (IIDTRC) in the UK retail sector. Using an in-depth multiple case studies of a selected number of cross-functional management teams in the UK retail companies, management roles were analysed. We used semi-structured interview as a qualitative data collect...
Preprint
Full-text available
The increasing importance and consequent challenges of establishing indirect trusted relationships in highly dynamic social networks such as vehicular social networks (VSNs), are investigated in this paper. VSNs are mobile social networks that aim to create social links among travellers on the roads. Besides matching interests between two users, so...
Article
Full-text available
Privacy and data protection by design are relevant parts of the General Data Protection Regulation (GDPR), in which businesses and organisations are encouraged to implement measures at an early stage of the system design phase to fulfil data protection requirements. This paper addresses the policy and system architecture design and propose two vari...
Article
Full-text available
In a world where organisations are embracing new IT working models such as Bring Your Own Device (BYOD) and remote working, the traditional mindset of defending the network perimeter is no longer sufficient. Zero Trust Architecture (ZTA) has recently emerged as a new security model in which the breach mindset dominates the threat model. By default,...
Article
With the purpose of defending against lateral movement in today's borderless networks, zero trust architecture (ZTA) adoption is gaining momentum. With a full-scale ZTA implementation, it is unlikely that adversaries will be able to spread through the network starting from a compromised endpoint. However, the already authenticated and authorized se...
Preprint
Full-text available
With the purpose of defending against lateral movement in todays borderless networks, Zero Trust Architecture (ZTA) adoption is gaining momentum. Considering a full scale ZTA implementation, it is unlikely that adversaries will be able to spread through the network starting from a compromised endpoint. However, the already authenticated and authori...
Article
Full-text available
For the first time in modern history, businesses had to suddenly facilitate homeworking for a large proportion, if not all, of their workforce because of COVID-19 pandemic. The fact that employees access sensitive corporate data from non-corporate networks opens the door wide for many cybersecurity risks that could result in data loss, breaches and...
Article
Full-text available
To ensure seamless communications between mobile Electric Vehicles (EVs) and EV power supply equipment, support for ubiquitous and transparent mobile IP communications is essential in Vehicle-to-Grid (V2G) networks. However, it initiates a range of privacy-related challenges as it is possible to track connected EVs through their mobile IP addresses...
Article
Electro-mobility has become an increasingly important research problem in urban cities. Due to the limited electricity of battery, electric vehicle (EV) drivers may experience discomfort for long charging waiting time. Different from plug-in charging technology, we investigate the battery switch technology to improve EV drivers’ comfort (e.g., redu...
Research Proposal
Full-text available
This call for book chapters is seeking chapter proposals for a handbook in Smart Mobility to be published by WS Publishing Europe in 2019. The book will provide a unique overview of the broad development in Smart Mobility from different technical perspectives. It will cover state-of-the-are developments in standards, applications, technologies (inc...
Article
Full-text available
Physical Layer Secure Key Generation (PL-SKG) schemes have received a lot of attention from the wireless security community in recent years because of the potential benefits that they could bring to the security landscape. These schemes aim to strengthen current security protocols by reducing the amount of key material that devices need for deploym...
Presentation
Full-text available
“Are you driving a smart connected car? If it has a software, it is hackable; and if it is connected, it is exposed. “ In an era where cars are no longer isolated mechanical machines that are solely used for transportation, a new cyber security challenge is born. With the introduction of telematics, vehicular communications, and the integration of...
Presentation
Full-text available
Regionally monitoring of both Smart Grids and Vehicular Ad hoc Networks (VANETs) is likely to be the responsibility of local government making the rationale for the use of the term community in this context clear while emphasising the importance of establishing the governance of these networks from the outset. In the context of monitoring by local...
Conference Paper
New protocols such as WebRTC promise seamless in-browser peer-to-peer communications that in theory remove the need for third-party services. In practice, widespread use of Firewalls, NATS and dynamic IP addresses mean that overlay addressing or use of some fixed rendezvous point is still needed. In this paper we describe a proximity-based pairing...
Conference Paper
Full-text available
Given the plethora of individual preferences and requirements of public transport passengers for travel, seating, catering, etc., it becomes very challenging to tailor generic services to individuals’ requirements using the existing service platforms. As tens of thousands of sensors have been already deployed along roadsides and rail tracks and on...
Thesis
Full-text available
Vehicular Ad hoc Networks (VANETs) are a particular form of wireless network made by vehicles communicating among themselves and with roadside base stations. A wide range of services has been developed for VANETs ranging from safety to infotainment applications. A key requirement for such services is that they are offered with Quality of Service (Q...
Article
Full-text available
Secure QoS routing algorithms are a fundamental part of wireless networks that aim to provide services with QoS and security guarantees. In Vehicular Ad hoc Networks (VANETs), vehicles perform routing functions, and at the same time act as end-systems thus routing control messages are transmitted unprotected over wireless channels. The QoS of the e...
Article
Full-text available
In intelligent transportation systems, the cooperation between vehicles and the road side units is essential to bring these systems to fruition. Vehicular ad hoc networks (VANETs) are a promising technology to enable the communications among vehicles on one hand and between vehicles and road side units on the other hand. However, it is a challengin...
Article
Full-text available
Vehicular ad hoc networks (VANETs) are a special form of wireless networks made by vehicles communicating among themselves on roads. The conventional routing protocols proposed for mobile ad hoc networks (MANETs) work poorly in VANETs. As communication links break more frequently in VANETs than in MANETs, the routing reliability of such highly dyna...

Questions

Question (1)
Question
Hi Everyone,
If you are interested or know someone who's interested in doing a fully funded PhD in the areas of wireless communications, security and privacy, please feel free to contcat me.
Max,

Network

Cited By