Prof Robin Ram Mohan Doss

STAFF PROFILE

Position

Deputy Head of School

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Qualifications

Doctor of Philosophy, Royal Melb Inst. of Technology, 2004
Master of Engineering, Royal Melb Inst. of Technology, 2003

Contact

robin.doss@deakin.edu.au
+61 3 925 17305

Biography

Robin Doss is Professor of Information Technology and Deputy Head of the School of Information Technology. Robin leads the Internet of Things (IoT) and Cyber Physical Systems (CPS) security program at the Deakin Centre for Cyber Security Research & Innovation (CSRI) and is the Co-Director of the IoT research cluster at Deakin. He is a senior member of the IEEE.

Read more on Robin's profile

Research interests

My research interests are in the broad areas of communication systems, protocol design, wireless networks, security and privacy. Honours/ PhD students who would like to work with me are requested to send me a copy of their CV and transcripts. Please do not list me as a potential supervisor without receiving my acceptance.

Research groups

Centre for Cyber Security Research

Internet of Things (IoT) Research Cluster 

Projects

1. Emergency Response Communication using Wireless Sensors, Deakin University Central Research Grant Scheme, 2006 ($15,000).

2. Securing a Critical Infrastructure of Wireless Sensors,Deakin University Central Research Grant Scheme, 2007 ($12, 000).

3. Collision Avoidance on Roadways using Vehicular Sensors, Deakin University Central Research Grant Scheme, 2007 ($20,000).

4. Recovery Mechanisms for Low-Resource Wireless Sensor Devices, National Security, Science and Technology (NSST), 2008 – 2009 ($89, 000).

5. Secure and Efficient Communication in Vehicle-based RFID systems, Australian Research Council (ARC), Linkage Project, 2010 – 2012 ($191, 000).

6. Indentifying Cyber Criminals on the Internet, Deakin University Central Research Grant Scheme, 2011 ($20,000).

Publications

Filter by

2018

Trust strategy implementation in OppNets

A Ahmad, R Doss, M Alajeely, S Rubeaai

(2018), Vol. 100, pp. 151-181, Computing, Wien, Austria, C1

journal

A novel approach for information discovery in wireless sensor grids

M Tissera, R Doss, G Li, V Mak-Hau, L Batten

(2018), Vol. 26, pp. 640-662, Journal of network and systems management, Berlin, Germany, C1

journal

Packet integrity defense mechanism in OppNets

A Ahmad, R Doss, M Alajeely, S Al Rubeaai, D Ahmad

(2018), Vol. 74, pp. 71-93, Computers and security, Amsterdam, The Netherlands, C1

journal

A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network

S Huda, S Miah, J Yearwood, S Alyahya, H Al-Dossari, R Doss

(2018), Vol. 120, pp. 23-31, Journal of parallel and distributed computing, Amsterdam, The Netherlands, C1

journal
2017

Defense against packet collusion attacks in opportunistic networks

M Alajeely, R Doss, A Ahmad, V Mak-Hau

(2017), Vol. 65, pp. 269-282, Computers & security, Amsterdam, The Netherlands, C1

journal

On sensor-based solutions for simultaneous presence of multiple RFID tags

S Piramuthu, R Doss

(2017), Vol. 95, pp. 102-109, Decision support systems, Amsterdam, The Netherlands, C1

journal

A secure search protocol for low cost passive RFID tags

S Sundaresan, R Doss, S Piramuthu, W Zhou

(2017), Vol. 122, pp. 70-82, Computer networks, Amsterdam, The Netherlands, C1

journal

Routing protocols in opportunistic networks - a survey

M Alajeely, R Doss, A Ahmad

(2017), pp. 1-19, IETE technical review, Abingdon, Eng., C1

journal

Attacks on and countermeasures for two RFID protocols

X Chen, T Cao, R Doss, J Zhai

(2017), Vol. 96, pp. 5825-5848, Wireless personal communications, New York, N.Y., C1

journal

Securing OppNets from packet integrity attacks using trust and reputation

A Ahmad, R Doss, M Alajeely, K Ahmad

(2017), pp. 7-12, WAINA 2017 : Proceedings of the 31st Advanced Information Networking and Applications Workshops 2017 International Conference, Taipei, Taiwan, E1

conference

Adjusting matryoshka protocol to address the scalability issue in IoT environment

G Al, R Doss, M Chowdhury

(2017), Vol. 759, pp. 84-94, FNSS 2017 :Proceedings of the 3rd International Future Network Systems and Security Conference, Florida, USA, E1

conference
2016

Security and trust in opportunistic networks - a survey

M Alajeely, R Ram Mohan Doss, M Asma'a Ahmad

(2016), Vol. 33, pp. 256-268, IETE technical review, Abingdon, Eng., C1

journal

Query verification schemes for cloud-hosted databases: a brief survey

F Riaz-ud-Din, W Zhou, R Ram Mohan Doss

(2016), Vol. 31, pp. 543-561, International journal of parallel, emergent and distributed systems, Abingdon, Eng., C1

journal

Establishing trust relationships in OppNets using Merkle trees

A Ahmad, M Alajeely, R Ram Mohan Doss

(2016), pp. 1-6, COMSNETS 2016: Proceedings of the 8th International Conference on Communication Systems and Networks, Bangalore, India, E1

conference

String matching query verification on the cloud-hosted databases

F Riaz-ud-Din, R Ram Mohan Doss, W Zhou

(2016), pp. 1-10, IICDCN 2016 : Proceedings of the 17th International Conference on Distributed Computing and Networking, Singapore, E1

conference

RFID ownership transfer protocol based on cloud

T Cao, X Chen, R Doss, J Zhai, L Wise, Q Zhao

(2016), Vol. 105, pp. 47-59, Computer networks, Amsterdam, The Netherlands, C1

journal

Malicious node detection in OppNets using hash chain technique

M Alajeely, A Ahmad, R Doss

(2016), pp. 925-930, ICCSNT 2015 : Proceedings of 2015 4th International Conference on Computer Science and Network Technology, Harbin, China, E1

conference

Secure RFID protocol to manage and prevent tag counterfeiting with Matryoshka concept

G Al, R Doss, M Chowdhury, B Ray

(2016), Vol. 670, pp. 126-141, FNSS 2016 : Proceedings of the Second International Conference on Future Network Systems and Security, Paris, France, E1

conference

Reputation based malicious node detection in OppNets

A Ahmad, M Alajeely, R Doss

(2016), pp. 1-6, JCSSE 2016 : Machine learning in the internet of things era : Proceedings of the 2016 13th International Joint Conference on Computer Science and Software Engineering, Khon Kaen, Thailand, E1

conference
2015

Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy

S Sundaresan, R Ram Mohan Doss, W Zhou, S Piramuthu

(2015), Vol. 55, pp. 112-124, Computer communications, Amsterdam, The Netherlands, C1

journal

Secure tag search in RFID systems using mobile readers

S Sundaresan, R Ram Mohan Doss, S Piramuthu, W Zhou

(2015), Vol. 12, pp. 1-14, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1

journal

Zero knowledge grouping proof protocol for RFID EPC C1G2 Tags

S Sundaresan, R Doss, W Zhou

(2015), Vol. 64, pp. 2994-3008, IEEE transactions on computers, Piscataway, N.J., C1

journal

Novel approach for information discovery in autonomous wireless sensor networks

M Tissera, R Ram Mohan Doss, G Li, L Batten

(2015), Vol. 523, pp. 47-60, Future network systems and security : first international conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings, Berlin, Germany, B1

chapter

An efficient detection mechanism against packet faking attack in opportunistic networks

M Alajeely, A Ahmad, R Ram Mohan Doss, V Mak

(2015), Vol. 523, pp. 84-100, Future network systems and security : first international conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings, Berlin, Germany, B1

chapter

Catabolism attack and anabolism defense: a novel attack and traceback mechanism in opportunistic networks

M Alajeely, R Doss, A Ahmad, V Mak-Hau

(2015), Vol. 71, pp. 111-118, Computer communications, Amsterdam, The Netherlands, C1

journal

Service engineering based on service oriented architecture methodology

S Suhardi, R Ram Mohan Doss, P Yustianto

(2015), Vol. 13, pp. 1466-1477, Telkomika: telecommunication, computing, electronics and control, Yogyakarta, Indonesia, C1

journal

Fast and energy efficient data storage for information discovery in multi-dimensional WSNs

Tissera, R Ram Mohan Doss, G Li, L Batten

(2015), pp. 88-93, ITNAC 2015: Proceedings of the 25th International Telecommunication Networks and Applications Conference, Sydney, New South Wales, E1

conference

Malicious node traceback in opportunistic networks using merkle trees

M Alajeely, A Ahmad, R Ram Mohan Doss

(2015), pp. 147-152, DSDIS 2015: Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, Sydney, New South Wales, E1

conference

Consolidating service enginering perspectives

P Yustianto, Suhardi, R Ram Mohan Doss

(2015), pp. 1-7, ICITSI 2015: Proceedings of the International Conference on Information Technology Systems and Innovation, Bandung, Indonesia, E1

conference
2014

Comparative Study of Routing Protocols for Opportunistic Networks

M Alajeely, Mr Alajeely

(2014), 7th International Conference on Sensing Technology,, NZ, E1

conference

A robust grouping proof protocol for RFID EPC C1G2 tags

S Sundaresan, R Ram Mohan Doss, S Piramuthu, W Zhou

(2014), Vol. 9, pp. 961-975, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Packet faking attack: a novel attack and detection mechanism in OppNets

M Alajeely, A Ahmad, R Ram Mohan Doss, V Mak

(2014), pp. 638-642, CIS 2014 : Proceedings of the 10th International Conference on Computational Intelligence and Security, Kunming, China, E1

conference

Defense against packet dropping attacks in opportunistic networks

A Ahmad, M Alajeely, R Ram Mohan Doss

(2014), pp. 1608-1613, ACCI 2014 : Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, Delhi, India, E1

conference

Energy efficient information discovery approach for range queries in multi-dimensional WSNs

M Tissera, R Ram Mohan Doss, G Li, L Batten

(2014), pp. 1-6, ICWiSe 2014: Proceedings of the IEEE Conference on Wireless Sensors, Subang, Selangor, Malaysia, E1

conference

Secure yoking proof protocol for RFID Systems

S Sundaresan, S Sundaresan, R Doss, R Doss

(2014), pp. 1608-1613, ICACCI 2014: Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, Delhi, India, E1

conference
2013

A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems

R Doss, S Sundaresan, W Zhou

(2013), Vol. 11, pp. 383-396, Ad hoc networks, New York, N.Y., C1

journal

Secure RFID tag ownership transfer based on quadratic residues

R Doss, W Zhou, S Yu

(2013), Vol. 8, pp. 390-401, IEEE Transactions on information forensics and security, Piscataway, N.J., C1

journal

Information discovery in multidimensional wireless sensor networks

M Tissera, R Doss, G Li, L Batten

(2013), pp. 54-59, ICOIN 2013 : Proceedings of the 27th International Conference on Information Networking, Bangkok, Thailand, E1

conference

A general cloud firewall framework with dynamic resource allocation

S Yu, R Doss, W Zhou, S Guo

(2013), pp. 1941-1945, Proceedings of the IEEE International Conference on Communications; ICC 2013, Budapest, Hungary, E1

conference

Offline grouping proof protocol for RFID systems

S Sundaresan, R Doss, W Zhou

(2013), pp. 247-252, WiMob 2013 2013 : Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Lyon, France, E1

conference

An adaptive approach to information discovery in multi-dimensional wireless sensor networks

M Tissera, R Doss, G Li, L Batten

(2013), pp. 203-208, ICST 2013 : Proceedings of the 7th International Conference on Sensing Technology, Wellington, New Zealand, E1

conference

RFID tags : grouping proof with forward security

S Sundaresan, R Doss, W Zhou

(2013), pp. 1-6, RFID-TA 2013 : Proceedings of the IEEE RFID-Technologies and Applications 2013 international conference, Johor Bahru, Malaysia, E1

conference

Secure ownership transfer in multi-tag/multi-owner passive RFID systems

S Sundaresan, R Doss, W Zhou

(2013), pp. 1-6, GLOBECOM 2013 : Proceedings of the IEEE Global Communications 2013 conference, Atlanta, Georgia, E1

conference
2012

A secure tag ownership transfer scheme in a closed loop RFID system

R Doss, W Zhou

(2012), pp. 164-169, WCNCW 2012 : Proceedings of the 2012 IEEE Wireless Communications and Networking Conference Workshops, Paris, France, E1

conference

A minimum disclosure approach to authentication and privacy in RFID systems

R Doss, W Zhou, S Sundaresan, S Yu, L Gao

(2012), Vol. 56, pp. 3401-3416, Computer networks, Amsterdam, The Netherlands, C1

journal

A serverless ultra-lightweight secure search protocol for EPC Class-1 Gen-2 UHF RFID tags

S Sundaresan, R Doss, W Zhou

(2012), pp. 580-585, ICCIS 2012 : Proceedings of the 2012 International Conference on Computer and Information Science, Kuala Lumpur, Malaysia, E1

conference

A secure search protocol based on Quadratic Residues for EPC Class-1 Gen-2 UHF RFID tags

S Sundaresan, R Doss, W Zhou

(2012), pp. 30-35, PIMRC 2012 : IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Sydney, New South Wales, E1

conference
2011

Traceback of DDoS attacks using entropy variations

S Yu, W Zhou, R Doss, W Jia

(2011), Vol. 22, pp. 412-425, IEEE transactions on parallel and distributed systems, United States, C1

journal

Prevention of information harvesting in a cloud services environment

L Batten, J Abawajy, R Doss

(2011), pp. 66-72, CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, E1

conference

A novel mutual authentication scheme with minimum disclosure for rfid systems

R Doss, W Zhou, S Yu, L Gao

(2011), pp. 544-549, ISSNIP 2011 : Proceedings of the 7th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Adelaide, S. Aust., E1

conference

Implementing recovery in low-resource stationary wireless sensor networks

B Li, L Batten, R Doss

(2011), pp. 11-20, Advances in wireless, mobile networks and applications, Berlin, Germany, B1

chapter
2010

Dynamic addressing in wireless sensor networks without location awareness

R Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2010), Vol. 26, pp. 443-460, Journal of information science and engineering, Taipei, Taiwan, C1

journal

Information discovery in mission-critical wireless sensor networks

R Doss, R Doss, G Li, G Li, V Mak, V Mak, M Tissera, M Tissera

(2010), Vol. 54, pp. 2383-2399, Computer networks, Amsterdam, Netherlands, C1-1

journal

Network resilience in low-resource mobile wireless sensor networks

B Li, L Batten, R Doss

(2010), pp. 127-138, Security and privacy in mobile information and communication systems : second international ICST conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010 : revised selected papers, Berlin, Germany, B1

chapter
2009

Fast recovery from node compromise in wireless sensor networks

B Li, R Doss, L Batten, W Schott

(2009), pp. 1-6, NTMS 2009 : Proceedings of the NTMS 2009 3rd International Conference on New Technologies, Mobility and Security, Cairo, Egypt, E1

conference

Lightweight authentication for recovery in wireless sensor networks

B Li, L Batten, R Doss

(2009), pp. 465-471, MSN 2009 : Proceedings of the Mobile Ad-hoc and Sensor Networks 2009 international conference, Fujian Province, China, E1

conference

Improving the qos for information discovery in autonomic wireless sensor networks

R Doss, G Li, V Mak, S Yu, M Chowdhury

(2009), Vol. 5, pp. 334-349, Pervasive and mobile computing, Amsterdam, Netherlands, C1

journal
2008

Information theory based detection against network behavior mimicking DDoS attacks

S Yu, W Zhou, R Doss

(2008), Vol. 12, pp. 319-321, IEEE communications letters, USA, C1

journal

The crossroads approach to information discovery in wireless sensor networks

R Doss, G Li, S Yu, V Mak, M Chowdhury

(2008), Vol. 4904, pp. 310-321, Lecture notes in computer science, Berlin, Germany, C1

journal

A transformation model for heterogeneous servers

S Yu, R Doss, T Thapngam, D Qian

(2008), pp. 665-671, HPCC 2008 : Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, Dalian, China, E1

conference

Exploiting affinity propagation for energy-efficient information discovery in sensor networks

R Doss, G Li

(2008), pp. 735-740, GLOBECOM 2008 : Proceedings of the IEEE Global Telecommunication Conference, New Orleans, La., E1

conference
2007

Self adjusted security architecture for mobile ad hoc networks (MANETs)

A Ghalwash, A Youssif, S Hashad, R Doss

(2007), pp. 682-687, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings, Melbourne, Australia, E1

conference

Geographic routing with cooperative relaying and leapfrogging in wireless sensor networks

P Coronel, R Doss, W Schott

(2007), pp. 646-651, IEEE GLOBECOM 2007 innovate, educate, accelerate: 50th Annual IEEE Global Telecommunications Conference, Washington, DC, USA, E1

conference
2006

Prediction based location aided routing for mobile ad hoc networks

R Doss, A Jennings, N Shenoy

(2006), Vol. 2, pp. 91-102, International journal of pervasive computing and communications, Leicester, England, C1

journal

Lease based addressing for event-driven wireless sensor networks

R Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2006), pp. 251-256, ISCC 2006 proceedings : 11th IEEE Symposium on Computers and Communications : 26-29 June 2006, Cagliari, Sardinia, Italy, Cagliari, Sardinia, Italy, E1

conference

Address reuse in wireless sensor networks

R Chellappa Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2006), pp. 329-333, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1

conference

Topology based packet marking for IP traceback

H Alwis, R Doss, P Hewage, M Chowdhury

(2006), pp. 224-228, Proceedings of the (ATNAC) Australian Telecommunication Networks and Applications Conference, Melbourne, Australia, E1

conference

A case for cross layer design: the impact of physical layer properties on routing protocol performance in MANETs

R Doss, L Pan

(2006), pp. 409-413, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1

conference

Energy efficient on-demand addressing for wireless sensor networks

P Hewage, R Doss, H Alwis, M Chowdhury

(2006), pp. 324-328, ATNAC : Proceedings of the Australian Telecommuncation Networks and Applications Conference, 2006, Melbourne, Victoria, E1

conference
2005

Reliable event transfer in wireless sensor networks deployed for emergency response

R Chellappa-Doss, D Chandra

(2005), pp. 208-213, Proceedings of the 17th IASTED International Conference on Parallel and Distributed Computing and Systems : November 14 - 16, 2005, Phoenix, AZ, USA, Phoenix, USA, E1

conference

Route maintenance using mobility prediction for mobile ad hoc networks

B Sathyaraj, R Chellappa-Doss

(2005), pp. 101-106, IEEE Mass 2005: the 2005 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Washington, D.C., E1

conference
2004

Mobility prediction based routing for minimizing control overhead in mobile ad hoc networks

R Doss, A Jennings, N Shenoy

(2004), pp. 27-31, ICWN`04 : Proceedings of the International Conference on Wireless Networks, Las Vegas, USA, E1

conference

A review of current mobility prediction techniques for ad hoc networks

R Doss, A Jennings, N Shenoy

(2004), Categorisation of failures in telecommunication networks : proceedings of the 4th IASTED International Multi-Conference Wireless and Optical Communications July 8-10, 2004, Banff, Canada, Banff, Canada, E1

conference

Mobility prediction for seamless mobility in wireless networks

R Doss, A Jennings, N Shenoy

(2004), pp. 435-443, INC 2004 : Proceedings of the 4th International Network Conference, Plymouth, UK, E1

conference

A review on current work in mobility prediction for wireless networks

R Chellappa-Doss, A Jennings, N Shenoy

(2004), pp. 1-7, Proceedings of the 3rd Asian International Mobile Computing Conference, Bangkok, Thailand, E1

conference
2003

User mobility prediction in hybrid and ad hoc wireless networks

R Chellappa-Doss, A Jennings, N Shenoy

(2003), pp. 1-5, 2003 Australian Telecommunications Networks and Applications Conference, Melbourne, Australia, E1

conference

Funded Projects at Deakin

Australian Competitive Grants

Secure and Efficient Communication in Vehicle-based Radio Frequency Identification Systems

Prof Wanlei Zhou, Prof Robin Ram Mohan Doss

ARC Linkage - Projects Rnd 1

  • 2012: $60,312
  • 2011: $54,402
  • 2010: $51,671

Other Public Sector Funding

Recovery Mechanisms for Wireless Sensor Devices

Prof Lynn Batten, Prof Robin Ram Mohan Doss, Mr Brian Palm

  • 2009: $18,855
  • 2008: $67,348

Industry and Other Funding

Secure and Efficient Communication in Vehicle-based Radio Frequency Identification Systems

Prof Wanlei Zhou, Prof Robin Ram Mohan Doss

  • 2012: $11,000
  • 2011: $11,000
  • 2010: $11,000

Other Funding Sources

AGD Data Analytics Workshop

A/Prof Jacob Cybulski, Prof Rens Scheepers, A/Prof Gang Li, Prof Robin Ram Mohan Doss

  • 2017: $13,936

Supervisions

Principal Supervisor
2017

Asma'a Nasser Ahmad

Thesis entitled: Establishing Trust Relationships and Secure Channels in Opportunistic Networks

Doctor of Philosophy (Information Technology), School of Information Technology

2016

Majeed Alajeely

Thesis entitled: Defence and Traceback Mechanisms in Opportunistic Wireless Networks

Doctor of Philosophy (Information Technology), School of Information Technology

2015

Warnakulasuriya Menik Randi Tissera

Thesis entitled: Information Discovery in Multi-Dimensional Autonomous Wireless Sensor Networks

Doctor of Philosophy (Information Technology), School of Information Technology

2014

Saravanan Sundaresan

Thesis entitled: Secure Ownership Transfer Protocols for RFID EPC C1G2 Tags

Doctor of Philosophy (Information Technology), School of Information Technology

Associate Supervisor
2012

Bai Li

Thesis entitled: Recovery Mechanisms on Sensor Networks

Doctor of Philosophy (Information Technology), School of Information Technology

Theerasak Thapngam

Thesis entitled: Improvement of DDoS Attacks Detection and Web Access Anonymity

Doctor of Philosophy (Information Technology), School of Information Technology

2011

Ping Li

Thesis entitled: Detecting Stepping Stones in Internet Environments

Doctor of Philosophy (Information Technology), School of Information Technology

2009

Ke Li

Thesis entitled: Reliable Algorithms and Attack Detection Schemes for Network Systems

Doctor of Philosophy (Information Technology), School of Information Technology