Tanveer Zia

Tanveer Zia
Charles Sturt University · School of Computing and Mathematics

BSCS, MBA, MIMM, PhD

About

122
Publications
78,540
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,171
Citations
Introduction
I am Professor of Computing in the School of Computing and Mathematics, Charles Sturt University. My research interests are in IoT security and security of low powered mobile devices. I am also interested in biometric security, cloud security, information assurance, protection against identity theft, trust management, and forensic computing.
Additional affiliations
March 2015 - April 2017
Charles Sturt University
Position
  • Associate Pofessor in Computing
June 2008 - present
Charles Sturt University
January 2004 - present
The University of Sydney
Education
March 2004 - September 2007
The University of Sydney
Field of study
  • Information Technologies
March 2002 - October 2003
University of Technology Sydney
Field of study
  • Information Technologies
October 1996 - December 1997
Preston University
Field of study
  • Business Administration

Publications

Publications (122)
Article
Full-text available
Security in the Software Development Life Cycle (SDLC) has become imperative due to the variety of threats posed during and after system design. In this paper we have studied the security in system design in general and software development in particular, and have proposed strategies for integration of security in the SDLC. The paper highlights the...
Conference Paper
Full-text available
Deployment of wireless sensor networks in sensitive applications such as healthcare, defence, habitat monitoring and early bush fire detection requires a careful consideration. These networks are prone to security attacks due to their wireless and deployment nature. It is very likely that after deployment of the network, sensor nodes are left unatt...
Article
Full-text available
Quality and security are two intertwined concepts where quality seeks perfection while security countermeasures the elements which weakens the quality. Wireless sensor networks have emerged as a promising future of many sensitive applications. Due to the wireless media and the deployment nature, sensor networks are more prone to security attacks. S...
Conference Paper
Full-text available
Wireless sensor networks are result of developments in micro electro mechanical systems and wireless networks. These networks are made of tiny nodes which are becoming future of many applications where sensor networks are deployed in hostile environments. The deployment nature where sensor networks are prone to physical interaction with environment...
Preprint
Full-text available
The virtual dimension called `Cyberspace' built on internet technologies has served people's daily lives for decades. Now it offers advanced services and connected experiences with the developing pervasive computing technologies that digitise, collect, and analyse users' activity data. This changes how user information gets collected and impacts us...
Chapter
To achieve high performance and classification accuracy, classification of emotions from audio or speech signals requires large quantities of data. Big datasets, however, are not always readily accessible. A good solution to this issue is to increase the data and augment it to construct a larger dataset for the classifier’s training. This paper pro...
Chapter
Emotional recognition from videos or images requires large amount of data to obtain high performance and classification accuracy. However, large datasets are not always easily available. A good solution to this problem is to augment the data and extrapolate it to create a bigger dataset for training the classifier. In this paper, we evaluate the im...
Article
Software Defined Networking (SDN) is an evolving technology that decouples the control functionality from the underlying hardware managed by the control plane. The application plane supports programmers to develop numerous applications (such as networking, management, security, etc.) that can even be executed from remote locations. Northbound inter...
Article
Full-text available
Abstract Vehicular named data network (VNDN) is the next‐generation network architecture for intelligent transportation system. Contrary to the conventional transmission control protocol/internet protocol (TCP/IP) communication model, VNDN follows a data‐centric approach where the user is interested in ‘WHAT’ instead of ‘WHERE’. Interest flooding a...
Preprint
Full-text available
Local differential privacy is a promising privacy-preserving model for statistical aggregation of user data that prevents user privacy leakage from the data aggregator. This paper focuses on the problem of estimating the distribution of discrete user values with Local differential privacy. We review and present a comparative analysis on the perform...
Conference Paper
Cyber-attacks are exponentially increasing daily with the advancements of technology. Therefore, the detection and prediction of cyber-attacks are very important for every organization that is dealing with sensitive data for business purposes. In this paper, we present a framework on cyber security using a data mining technique to predict cyber-att...
Article
Affective computing is an emerging multidisciplinary research field that is increasingly drawing the attention of researchers and practitioners in various fields, including artificial intelligence, natural language processing, cognitive and social sciences. Research in affective computing includes areas such as sentiment, emotion, and opinion model...
Article
Full-text available
Digital health is widely believed to have vast potential in improving patient care. MyHealthRecord (MyHR) is a digital health information system which enables Australian citizens to access their health information centrally, making it available anywhere, at anytime. The aim of this study is to explore the adoption of MyHR in general practices in Vi...
Article
Full-text available
The user acceptance of technology determines its success and failure. Digital health is having a major impact on the improvement of health care and its delivery. My Health Record (MyHR) is the digital health solution that Australia implemented nationally to facilitate accessibility of health summaries data anywhere and anytime. The objective of thi...
Article
This paper addresses the broadcasting storm problem by proposing an optimized relay vehicle selection methodology in the Vehicular Ad-hoc Networks (VANETs). A crucial effect observed in the broadcasting storm is the network congestion that is caused by multiple retransmissions generated by the relay vehicles to achieve the desired network coverage....
Chapter
Broadcasting is a communication mechanism utilized in VANET architecture that facilitates in disseminated of public information to help reduce traffic jams/congestions. The authentic and genuine nature of public information is required to be maintained to avoid broadcasting of false information causing mass panic and hysteria. Therefore, it is of u...
Chapter
Background: It is widely expected in Australia that digital health solutions such as MyHealthRecord (MyHR) have vast potential to enable easier, safer and faster patientcare. Being the gateway to the health system, the general practice environment has been one of the target areas for MyHR adoption. Aim: This doctoral qualitative research aims to in...
Article
Full-text available
Digital health has significant potential in health and healthcare system improvement. My Health Record (MyHR), one of digital health solutions, has been one of the focus in Australia for past few years. Aiming to initiate a study of MyHR adoption in general practices, this paper brings up results of systematically reviewed literature. Four phased t...
Article
Full-text available
Digital health has significant potential in health and healthcare system improvement. My Health Record (MyHR), one of digital health solutions, has been one of the focus in Australia for past few years. Aiming to initiate a study of MyHR adoption in general practices, this paper brings up results of systematically reviewed literature. Four phased t...
Chapter
The purpose of this paper is to examine the relevance of biometric technologies in increasing the fight against terrorism and other related border security challenges such as identity dominance. Since the 11th September, 2001 catastrophe in USA the need for biometrics technology for identification purpose has become important. Consequently, the man...
Article
Confidentiality of health information is indispensable to protect privacy of an individual. However, recent advances in electronic healthcare systems allow transmission of sensitive information through the Internet, which is prone to various vulnerabilities, attacks and may leads to unauthorized disclosure. Such situations may not only create adver...
Conference Paper
Full-text available
Internet of Things (IoT) devices and services have gained wide spread growth in many commercial and mission critical applications. The devices and services suffer from intrusions, attacks and malicious activities. To protect valuable data transmitted through IoT networks and users' privacy, intrusion detection systems (IDS) should be developed to m...
Article
Full-text available
Traditionally wireless sensor networks’ deployment is meant for a single application, which limits the commercial deployment of a sensor network. In many scenarios, however, it has become desirable to use a sensor network to run multiple applications where the demand for applications that can harness the capabilities of a sensor-rich environment in...
Conference Paper
Full-text available
Besides its enormous benefits to the industry and community the Internet of Things (IoT) has introduced unique security challenges to its enablers and adopters. As the trend in cybersecurity threats continue to grow, it is likely to influence IoT deployments. Therefore it is eminent that besides strengthening the security of IoT systems we develop...
Article
Full-text available
The Internet of Vehicles (IoV) is an emerging paradigm aiming to introduce a plethora of innovative applications and services that impose a certain quality of service requirements. The IoV mainly relies on vehicular ad-hoc networks (VANETs) for autonomous inter-vehicle communication and road-traffic safety management. With the ever-increasing deman...
Article
Full-text available
The developments and applications of Wireless Body Area Networks (WBANs) for healthcare and remote monitoring have brought a revolution in the medical research field. Numerous physiological sensors are integrated in a WBAN architecture in order to monitor any significant changes in normal health conditions. This monitored data are then wirelessly t...
Article
Full-text available
Cloud computing has led to a lot of improvements in the way we manage our IT infrastructure, but this convenience has led to new security challenges. In this paper, we recreate a cross Virtual Machine Flush+Reload cache timing attack and document our attack methodology in depth. Cache timing attacks are highly technical, and executing them in a vir...
Article
Full-text available
The purpose of this paper is to examine the relevance of biometric technologies in increasing the fight against terrorism and other related border security challenges such as identity dominance. Since the 11th September, 2001 catastrophe in USA the need for biometrics technology for identification purpose has become important. Consequently, the man...
Conference Paper
Full-text available
This paper identifies the role of electronic Health (eHealth) in supporting healthy ageing (HA) and explores the factors which impacts on technology acceptance. An exploratory study was conducted to capture experiences of fifteen participants. The results show that seniors require awareness about the benefits of eHealth technologies and how the adv...
Article
Full-text available
This paper provides a study of chemical laboratory equipment utilizing serial connection (e.g. RS-232) communications and highlights the challenges associated w ith dissimilar communication ports. The problem studied in this paper is significant because many advanced chemical laboratories still rely on equipment with serial ports. The study starts...
Article
Full-text available
During the past two decades particularly, there has been incredible growth in the telecommunication industry which evolved the demand for real time applications. Mobile grids and internet service providers are offering competitive real time services to customers in order to fulfil their daily demands. Nowadays, WiMAX has become a key player in tele...
Conference Paper
Full-text available
In today’s more digitized world, the notion of Information Technology’s (IT) delivery of value to businesses has been stretched to mitigation of broader organisations’ risk. This has triggered the higher management levels to provide IT security in all levels of organisations’ governance and decision making processes. With such stringent governance,...
Article
Full-text available
Reliability stands as the first important factor when dealing with medical data within the context of a wireless body area network (WBAN). The sensor nodes on body send their data to the coordinator based on a beacon-enabled access mode defined in IEEE 802.15.4 medium access control (MAC) specifications. This paper studies an effective backoff reso...
Article
Full-text available
A new sparse kernel density estimator is introduced based on the minimum integrated square error criterion for the finite mixture model. Since the constraint on the mixing coefficients of the finite mixture model is on the multinomial manifold, we use the well-known Riemannian trust-region (RTR) algorithm for solving this problem. The first- and se...
Conference Paper
Full-text available
Modeling wireless transmission in stringent networks such as VANETs is a challenging task. This requires mathematically incorporating all the environmental effects present within such a dynamics atmosphere. The key attributes to model the wireless channel are physical constraints inherent to such networks such as lack of permanent infrastructure, l...
Article
Full-text available
In recent years, vehicular ad-hoc networks have emerged as a key wireless technology offering countless new services and applications for the transport community. Along with many interesting and useful applications, there have been a number of design challenges to create an efficient and reliable routing scheme. A conventional design approach only...
Conference Paper
Full-text available
Data-oriented wireless sensor networks (WSNs) are expected to support the diverse infrastructure-based commercial and military services, including real-time traffic monitoring, ecosystem and battlefield surveillance. The success of data-oriented WSNs depends on the underlying information infrastruc-ture to store the large amount of highly sensitive...
Data
Full-text available
Conference Paper
Full-text available
Routing is an important and critical issue for success-ful transmission in Vehicular Ad-hoc Networks (VANETs). Most of the traditionally designed routing schemes are based on optimising their parameters individually in the existing VANET architecture. Such approaches may not result in an overall efficient system. Therefore, it is important to consi...
Book
Wireless sensor networks have great potential to be employed in mission critical situations like battlefields but also in more everyday security and commercial applications such as building and traffic surveillance, habitat monitoring and smart homes. However, wireless sensor networks pose unique security challenges. This book presents a security f...
Conference Paper
Full-text available
The existing digital watermarking schemes use a digital pattern like pseudorandom number sequence, a logo image or a digital signature as the watermark. Use of such watermarks is not convincing as the ownership of such a watermark is not clear for ownership claims. This paper proposes an efficient digital watermark generation technique from biometr...
Conference Paper
Full-text available
Different MAC techniques in body area networks (BAN) are to make different tradeoffs to suit for the variety of situations that may be caused by the heterogeneous traffic behavior of the BANs. Previously, we proposed a dynamic delayed MAC scheme with a fuzzy technique to add a traffic adaptive quality to the existing IEEE 802.15.4 which addresses t...
Book
Full-text available
Due to increase in the scale and sophistication of cyber crimes conducted through the communication networks, it is imperative for the research community to ensure protection of data disseminated through these networks. Online information assets are further threatened because of increasing trend towards adoption of cloud computing and virtualisatio...
Article
Full-text available
Security is a crucial issue for wireless sensor networks due to the deployment nature and the resources limitations of tiny sensor devices used in such networks. Sensor networks are used sometime in very sensitive applications such as healthcare and military. With this in mind we must address the security concerns from the beginning of network desi...
Article
Full-text available
Multiple wireless devices are being widely deployed in Intelligent Transportation System (ITS) services on the road to establish end-to-end connection between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) networks. Vehicular ad hoc networks (VANETs) play an important role in supporting V2V and V2I communications (also called V2X comm...
Conference Paper
Full-text available
Wireless Body Area Networks (WBAN) have emerged as an extension to conventional wireless sensor networks in recent years to comply with the needs in providing timely and effective response in healthcare as one of the many target applications such networks have. The traffic of a WBAN is diverse due to different monitoring tasks carried on by sensor...
Conference Paper
Wireless biomedical sensor networks in healthcare have been a great motivation in providing a timely and effective response in healthcare services as one of the many target applications such networks have. Being heterogeneous in real-time traffic attributes associated with each biological sensor, organizing the access to the shared wireless medium...
Conference Paper
One of the applications of wireless accelerometer sensors is to monitor the human body motion and orientation. Such applications range from medical observations, diagnostics and fall detection to game console and entertainment. In typical wireless accelerometer sensors the received data is affected by the nonlinear environmental noises leading to a...
Chapter
Full-text available
A set of attributes instead of a single string to represent the signer’s identity is a challenging problem under standard cryptographic assumption in the standard model. Therefore, designing a fully secure (adaptive-predicate unforgeable and perfectly private) attribute-based signature (ABS) that allows a signer to choose a set of attributes is vit...
Article
Full-text available
Vehicular ad-hoc networks (VANETs) technology has emerged as an important research area over the last few years. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or situation. VANETs have now been established as reliable networks that vehicles use for communic...
Chapter
A set of attributes instead of a single string to represent the signer’s identity is a challenging problem under standard cryptographic assumption in the standard model. Therefore, designing a fully secure (adaptive-predicate unforgeable and perfectly private) Attribute-Based Signature (ABS) that allows a signer to choose a set of attributes is vit...
Conference Paper
The adaption of cloud computing is on a rise these days, due to the various effects that it has on enterprise. As it allows the users to have scalable infrastructure and economical benefits which indeed a way to boost any enterprise mind in opting for such service. Cloud Computing offers a whole new paradigm to allow the users to have high-end and...
Article
The benefits of cloud computing are clearly well known which include rapid deployment, ease of customization, reduce cost and low risks. However, some high profile security breaches confuse organizations as they attempt to deploy cloud services in their businesses. Although, the cloud service providers pitch the security of their services. Enhancem...
Conference Paper
Ad-hoc networking has enormously revolutionized the way we do computing nowadays. The idea originates from understanding true meaning of the Latin word ad-hoc which is described as ‘specific for the need’. So the concept of ad-hoc networking translates to ‘creating network for a specific need or situation’. Mobile Ad-hoc Networks (MANETs) is a spec...
Conference Paper
In a typical wireless body area network data packet loss is high due to the movement of sensor nodes attached to the body limbs. To address this problem we propose a novel position-aware MAC protocol (PA-MAC) in the wireless body area network which considers the nodes’ relative positions to the coordinator when the subject is moving. We modify the...
Conference Paper
One of the applications of wireless accelerometer sensors is to monitor the human body motion and orientation. Applications using monitoring the body motion range from medical observations (Reference), diagnostics (Reference) and fall detection (Reference) to game console and entertainment. In typical wireless accelerometer sensors the received dat...