Biography
Professor Robin Doss is the Research Director for the University's Strategic Research Centre (SRC) in Cyber Security Research and Innovation (CSRI). In addition, he leads Deakin University's participation in the Cyber Security Cooperative Research Centre (CSCRC) and is the theme leader for the CSCRC's research theme on "Development of Next Generation Authentication Technologies".
Read more on Robin's profileResearch interests
My research interests are in the broad areas of communication systems, protocol design, wireless networks, security and privacy. Honours/ PhD students who would like to work with me are requested to send me a copy of their CV and transcripts. Please do not list me as a potential supervisor without receiving my acceptance.
Research groups
Centre for Cyber Security Research
Internet of Things (IoT) Research Cluster
Projects
1. Emergency Response Communication using Wireless Sensors, Deakin University Central Research Grant Scheme, 2006 ($15,000).
2. Securing a Critical Infrastructure of Wireless Sensors,Deakin University Central Research Grant Scheme, 2007 ($12, 000).
3. Collision Avoidance on Roadways using Vehicular Sensors, Deakin University Central Research Grant Scheme, 2007 ($20,000).
4. Recovery Mechanisms for Low-Resource Wireless Sensor Devices, National Security, Science and Technology (NSST), 2008 – 2009 ($89, 000).
5. Secure and Efficient Communication in Vehicle-based RFID systems, Australian Research Council (ARC), Linkage Project, 2010 – 2012 ($191, 000).
6. Indentifying Cyber Criminals on the Internet, Deakin University Central Research Grant Scheme, 2011 ($20,000).
7. Enabling Smart and Safe Cities through IoT Technologies, SPARC Grant, 2019 - 2020 ($147,000)
8. Cyber-Safe Connected Vehicles: Ensuring Secure, Trusted, and Robust Cooperative Automotive Systems, AEGP Grant, 2019 - 2021 ($494,900)
Publications
Data congestion in VANETs: research directions and new trends through a bibliometric analysis
Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan
(2021), The Journal of Supercomputing, C1
Pengjie Zeng, Xiaoliang Wang, Hao Li, Frank Jiang, Robin Doss
(2020), Vol. 8, pp. 33644-33657, IEEE Access, Piscataway, N.J., C1
Secure attribute-based search in RFID-based inventory control systems
R Doss, R Trujillo Rasua, S Piramuthu
(2020), Vol. 132, pp. 1-10, Decision support systems, Amsterdam, The Netherlands, C1
A novel RFID-based anti-counterfeiting scheme for retail environments
G Khalil, R Doss, M Chowdhury
(2020), Vol. 8, pp. 47952-47962, IEEE Access, Piscataway, N.J., C1
A new secure RFID anti-counterfeiting and anti-theft scheme for merchandise
G Khalil, R Doss, M Chowdhury
(2020), Vol. 9, pp. 1-14, Journal of sensor and actuator networks, Basel, Switzerland, C1
An efficient voting based decentralized revocation protocol for vehicular ad hoc networks
Miraj Asghar, Lei Pan, Robin Ram Mohan Doss
(2020), pp. 1-18, Digital Communications and Networks, Amsterdam, The Netherlands, C1
SEPN: A Sequential Engagement Based Academic Performance Prediction Model
X song, J Li, S Sun, H Yin, P Dawson, R Doss
(2020), pp. 1-9, IEEE Intelligent Systems, Piscataway, N.J., C1
Echo-ID: Smart user identification leveraging inaudible sound signals
Syed Shah, Arash Shaghaghi, Salil Kanhere, Jin Zhang, Adnan Anwar, Robin Ram Mohan Doss
(2020), Vol. 8, pp. 194508-194522, IEEE Access, Piscataway, N.J., C1
A review of simulators used for VANETs: The case-study of vehicular mobility generators
T Bhatia, R Ketti Ramachandran, R Ram Mohan Doss, L Pan
(2020), SPIN 2020 Proceedings of the 7th International Conference on Signal Processing and Integrated Networks, Noida, India, E1
Adopting SOA and microservices for inter-enterprise architecture in SME communities
A Andriyanto, R Doss, P Yustianto
(2020), pp. 282-287, ICEEIE 2019 : Emerging innovative technology for sustainable future : Proceedings of the 6th International Conference on Electrical, Electronics and Information Engineering 2019, Denpasar, Indonesia, E1
M Chowdhury, R Doss, B Ray, S Rajasegarar, S Chowdhury
(2020), Vol. 324, pp. 28-41, SGIoT 2019 : Proceedings of the Third European Alliance for Innovation International Conference on Smart Grid and Internet of Things 2019, TaiChung, Taiwan, E1
Smart parking with Computer Vision and IoT technology
M Dixit, C Srimathi, R Doss, S Loke, M Saleemdurai
(2020), pp. 170-174, TSP : Proceedings of the 2020 43rd International Conference on Telecommunications and Signal Processing, Online from Milan, Italy, E1
A survey on controlling the congestion in vehicle-to-vehicle communication
Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan
(2020), pp. 573-578, ICRITO 2020 : Trends and future directions : Proceedings of the IEEE 8th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, E1
Detection and control of data congestion in vehicular broadcast networks
Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan
(2020), pp. 1044-1049, ICRITO 2020 : Trends and future directions : Proceedings of the 2020 8th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, E1
A comprehensive review on the vehicular ad-hoc networks
Tarandeep Bhatia, Ramkumar Ramachandran, Robin Doss, Lei Pan
(2020), pp. 515-520, ICRITO 2020 : Trends and future directions : Proceedings of the 2020 8th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, E1
Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs
Edoardo Puggioni, Arash Shaghaghi, Robin Ram Mohan Doss, Salil Kanhere
(2020), The 19th IEEE International Symposium on Network Computing and Applications (NCA 2020), Online, E1
Security Evaluation of Smart Contract-Based On-chain Ethereum Wallets
Purathani Praitheeshan, Lei Pan, Robin Doss
(2020), Vol. 12570, pp. 22-41, Network and System Security. NSS 2020, Melbourne, Australia, E1
A unifying structure of metamodel landscape
P Yustianto, R Doss, R Suhardi
(2019), Vol. 14, pp. 134-152, Journal of modelling in management, Bingley, Eng., C1
An improved authentication scheme for Internet of Vehicles based on blockchain technology
Xiaoliang Wang, Pengjie Zeng, Nick Patterson, Frank Jiang, Robin Doss
(2019), Vol. 7, pp. 45061-45072, IEEE access, Piscataway, N.J., C1
Privacy-preserving history-based routing in Opportunistic Networks
S Rashidibajgan, R Doss
(2019), Vol. 84, pp. 244-255, Computers and security, Amsterdam, The Netherlands, C1
A comparison survey study on RFID based anti-counterfeiting systems
Ghaith Khalil, Robin Doss, M Chowdhury
(2019), Vol. 8, Journal of sensor and actuator networks, Basel, Switzerland, C1
Shiju Sathyadevan, K Achuthan, Robin Ram Mohan Doss, Lei Pan
(2019), Vol. 7, pp. 92419-92435, IEEE access, Piscataway, N.J., C1
P Yustianto, R Doss, Suhardi, N Kurniawan
(2019), pp. 555-561, ICITSI 2018 : Proceedings of the 5th International Conference on Information Technology Systems and Innovation, Bandung and Padang, Indonesia, E1
A literature review of inter-enterprise SOA in small and medium business communities
A Andriyanto, R Doss, L Pan, P Yustianto
(2019), pp. 547-554, ICITSI 2018 : Proceedings of the 5th International Conference on Information Technology Systems and Innovation, Bandung and Padang, Indonesia, E1
Intrusion detection system classifier for VANET based on pre-processing feature extraction
Ayoob Ayoob, Ghaith Khalil, Morshed Chowdhury, Robin Ram Mohan Doss
(2019), Vol. 1113, pp. 3-22, FNSS 2019 : Future Network Systems and Security 5th International Conference, FNSS 2019 Melbourne, VIC, Australia, November 27–29, 2019 Proceedings, Melbourne, Victoria, E1
Digital Forensics for Drone Data - Intelligent Clustering Using Self Organising Maps
Sri Mekala, Zubair Baig
(2019), Vol. 1113, pp. 172-189, Future Network Systems and Security. FNSS 2019, Melbourne, Australia, E1
An efficient dynamic group-based batch verification scheme for vehicular sensor networks
L Jiang, Y Wang, J Tian, F Jiang, Nicholas Patterson, R Ram Mohan Doss
(2019), pp. 52-64, FNSS 2019 : Proceedings of the 5th International Conference of Future Network Systems and Security, Melbourne, Victoria, E1
Attainable hacks on keystore files in ethereum wallets--a systematic analysis
Purathani Praitheeshan, Y Xin, Lei Pan, Robin Ram Mohan Doss
(2019), FNSS 2019 : Future Network Systems and Security, Melbourne, Australia, E1
Quorum chain-based malware detection in android smart devices
F Gao, F Jiang, Y Zhang, R Doss
(2019), Vol. 1113, pp. 212-224, FNSS 2019 : Future Network Systems and Security : 5th International Conference, FNSS 2019 Melbourne, VIC, Australia, November 27–29, 2019 Proceedings, Melbourne, Vic., E1
Insider attacks on Zigbee based IoT networks by exploiting AT commands
W Piracha, M Chowdhury, B Ray, S Rajasegarar, R Doss
(2019), Vol. 1116, pp. 77-91, ATIS 2019 : Proceedings of the 10th Applications and Techniques in Information Security Conference 2019, Tamil Nadul, India, E1
A survey in RFID ownership transfer protocols
Gaith Al, Torana Al, M Chowdhury, R Doss
(2018), pp. 83-91, RFID technology: design principles, applications and controversies, Hauppauge, N.Y., B1
Survey on RFID security issues and scalability
Torana Al, Gaith Al, R Doss
(2018), pp. 37-50, RFID technology: design principles, applications and controversies, Hauppage, N.Y., B1
Trust strategy implementation in OppNets
A Ahmad, R Doss, M Alajeely, S Rubeaai
(2018), Vol. 100, pp. 151-181, Computing, Wien, Austria, C1
A novel approach for information discovery in wireless sensor grids
M Tissera, R Doss, G Li, V Mak-Hau, L Batten
(2018), Vol. 26, pp. 640-662, Journal of network and systems management, Berlin, Germany, C1
Packet integrity defense mechanism in OppNets
A Ahmad, R Doss, M Alajeely, S Al Rubeaai, D Ahmad
(2018), Vol. 74, pp. 71-93, Computers and security, Amsterdam, The Netherlands, C1
S Huda, S Miah, J Yearwood, S Alyahya, H Al-Dossari, R Doss
(2018), Vol. 120, pp. 23-31, Journal of parallel and distributed computing, Amsterdam, The Netherlands, C1
Mapping functions driven robust retinal vessel segmentation via training patches
H Xia, F Jiang, S Deng, J Xin, R Doss
(2018), Vol. 6, pp. 61973-61982, IEEE access, Piscataway, N.J., C1
Identifying drawbacks in malicious PDF detectors
A Falah, L Pan, M Abdelrazek, R Doss
(2018), Vol. 878, pp. 128-139, FNSS 2018 : Proceedings of the Future Network Systems and Security Conference 2018, Paris, France, E1
A new method for sharing the public keys in opportunistic networks
S Rashidibajgan, R Doss
(2018), Vol. 878, pp. 147-161, FNSS 2018 : Future network systems and security : 4th International Conference, FNSS 2018, Paris, France, July 9-11, 2018, Proceedings, Paris, France, E1
Activities and artifacts in service engineering: Case study report of service engineering framework
P Yustianto, R Doss, S Suhardi
(2018), Vol. 2018-January, pp. 373-377, ICITSI IEEE 2017 : Information Technology Systems and Innovation : 4th Proceeding of International Conference, Bandung, Indonesia, E1
A scalable and efficient PKI based authentication protocol for VANETs
M Asghar, R Doss, L Pan
(2018), pp. 1-3, ITNAC 2018 : Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference, Sydney, N.S.W., E1
Defense against packet collusion attacks in opportunistic networks
M Alajeely, R Doss, A Ahmad, V Mak-Hau
(2017), Vol. 65, pp. 269-282, Computers & security, Amsterdam, The Netherlands, C1
On sensor-based solutions for simultaneous presence of multiple RFID tags
S Piramuthu, R Doss
(2017), Vol. 95, pp. 102-109, Decision support systems, Amsterdam, The Netherlands, C1
A secure search protocol for low cost passive RFID tags
S Sundaresan, R Doss, S Piramuthu, W Zhou
(2017), Vol. 122, pp. 70-82, Computer networks, Amsterdam, The Netherlands, C1
Routing protocols in opportunistic networks - a survey
M Alajeely, R Doss, A Ahmad
(2017), pp. 1-19, IETE technical review, Abingdon, Eng., C1
Attacks on and countermeasures for two RFID protocols
X Chen, T Cao, R Doss, J Zhai
(2017), Vol. 96, pp. 5825-5848, Wireless personal communications, New York, N.Y., C1
Portguard - An authentication tool for securing ports in an IoT gateway
S Sathyadevan, V Vejesh, R Doss, L Pan
(2017), pp. 624-629, PerCom 2017 : IEEE International Conference on Pervasive Computing and Communications Workshops, Kona, Hawaii, E1
Securing OppNets from packet integrity attacks using trust and reputation
A Ahmad, R Doss, M Alajeely, K Ahmad
(2017), pp. 7-12, WAINA 2017 : Proceedings of the 31st Advanced Information Networking and Applications Workshops 2017 International Conference, Taipei, Taiwan, E1
Adjusting matryoshka protocol to address the scalability issue in IoT environment
G Al, R Doss, M Chowdhury
(2017), Vol. 759, pp. 84-94, FNSS 2017 :Proceedings of the 3rd International Future Network Systems and Security Conference, Florida, USA, E1
Security and trust in opportunistic networks - a survey
M Alajeely, R Ram Mohan Doss, M Asma'a Ahmad
(2016), Vol. 33, pp. 256-268, IETE technical review, Abingdon, Eng., C1
Query verification schemes for cloud-hosted databases: a brief survey
F Riaz-ud-Din, W Zhou, R Ram Mohan Doss
(2016), Vol. 31, pp. 543-561, International journal of parallel, emergent and distributed systems, Abingdon, Eng., C1
RFID ownership transfer protocol based on cloud
T Cao, X Chen, R Doss, J Zhai, L Wise, Q Zhao
(2016), Vol. 105, pp. 47-59, Computer networks, Amsterdam, The Netherlands, C1
Establishing trust relationships in OppNets using Merkle trees
A Ahmad, M Alajeely, R Ram Mohan Doss
(2016), pp. 1-6, COMSNETS 2016: Proceedings of the 8th International Conference on Communication Systems and Networks, Bangalore, India, E1
String matching query verification on the cloud-hosted databases
F Riaz-ud-Din, R Ram Mohan Doss, W Zhou
(2016), pp. 1-10, IICDCN 2016 : Proceedings of the 17th International Conference on Distributed Computing and Networking, Singapore, E1
Malicious node detection in OppNets using hash chain technique
M Alajeely, A Ahmad, R Doss
(2016), pp. 925-930, ICCSNT 2015 : Proceedings of 2015 4th International Conference on Computer Science and Network Technology, Harbin, China, E1
Secure RFID protocol to manage and prevent tag counterfeiting with Matryoshka concept
G Al, R Doss, M Chowdhury, B Ray
(2016), Vol. 670, pp. 126-141, FNSS 2016 : Proceedings of the Second International Conference on Future Network Systems and Security, Paris, France, E1
Reputation based malicious node detection in OppNets
A Ahmad, M Alajeely, R Doss
(2016), pp. 1-6, JCSSE 2016 : Machine learning in the internet of things era : Proceedings of the 2016 13th International Joint Conference on Computer Science and Software Engineering, Khon Kaen, Thailand, E1
Novel approach for information discovery in autonomous wireless sensor networks
M Tissera, R Ram Mohan Doss, G Li, L Batten
(2015), Vol. 523, pp. 47-60, Future network systems and security : first international conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings, Berlin, Germany, B1
An efficient detection mechanism against packet faking attack in opportunistic networks
M Alajeely, A Ahmad, R Ram Mohan Doss, V Mak
(2015), Vol. 523, pp. 84-100, Future network systems and security : first international conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings, Berlin, Germany, B1
S Sundaresan, R Ram Mohan Doss, W Zhou, S Piramuthu
(2015), Vol. 55, pp. 112-124, Computer communications, Amsterdam, The Netherlands, C1
Secure tag search in RFID systems using mobile readers
S Sundaresan, R Ram Mohan Doss, S Piramuthu, W Zhou
(2015), Vol. 12, pp. 1-14, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1
Zero knowledge grouping proof protocol for RFID EPC C1G2 Tags
S Sundaresan, R Doss, W Zhou
(2015), Vol. 64, pp. 2994-3008, IEEE transactions on computers, Piscataway, N.J., C1
M Alajeely, R Doss, A Ahmad, V Mak-Hau
(2015), Vol. 71, pp. 111-118, Computer communications, Amsterdam, The Netherlands, C1
Service engineering based on service oriented architecture methodology
S Suhardi, R Ram Mohan Doss, P Yustianto
(2015), Vol. 13, pp. 1466-1477, Telkomika: telecommunication, computing, electronics and control, Yogyakarta, Indonesia, C1
R Doss, S Piramuthu, W Zhou
(2015), Vol. 523, Communications in Computer and Information Science, A7
Fast and energy efficient data storage for information discovery in multi-dimensional WSNs
M Tissera, R Doss, G Li, L Batten
(2015), pp. 88-93, 25th International Telecommunication Networks and Applications Conference, ITNAC 2015, E1
Malicious node traceback in opportunistic networks using merkle trees
M Alajeely, A Ahmad, R Ram Mohan Doss
(2015), pp. 147-152, DSDIS 2015: Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, Sydney, New South Wales, E1
Consolidating service enginering perspectives
P Yustianto, Suhardi, R Ram Mohan Doss
(2015), pp. 1-7, ICITSI 2015: Proceedings of the International Conference on Information Technology Systems and Innovation, Bandung, Indonesia, E1
A robust grouping proof protocol for RFID EPC C1G2 tags
S Sundaresan, R Ram Mohan Doss, S Piramuthu, W Zhou
(2014), Vol. 9, pp. 961-975, IEEE transactions on information forensics and security, Piscataway, N.J., C1
Packet faking attack: a novel attack and detection mechanism in OppNets
M Alajeely, A Ahmad, R Ram Mohan Doss, V Mak
(2014), pp. 638-642, CIS 2014 : Proceedings of the 10th International Conference on Computational Intelligence and Security, Kunming, China, E1
Defense against packet dropping attacks in opportunistic networks
A Ahmad, M Alajeely, R Ram Mohan Doss
(2014), pp. 1608-1613, ACCI 2014 : Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, Delhi, India, E1
Energy efficient information discovery approach for range queries in multi-dimensional WSNs
M Tissera, R Ram Mohan Doss, G Li, L Batten
(2014), pp. 1-6, ICWiSe 2014: Proceedings of the IEEE Conference on Wireless Sensors, Subang, Selangor, Malaysia, E1
Secure yoking proof protocol for RFID Systems
S Sundaresan, S Sundaresan, S Sundaresan, S Sundaresan, R Doss, R Doss, R Doss, R Doss
(2014), pp. 1608-1613, ICACCI 2014: Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, Delhi, India, E1
A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems
R Doss, S Sundaresan, W Zhou
(2013), Vol. 11, pp. 383-396, Ad Hoc Networks, C1
Secure RFID tag ownership transfer based on quadratic residues
R Doss, W Zhou, S Yu
(2013), Vol. 8, pp. 390-401, IEEE Transactions on Information Forensics and Security, C1
Information discovery in multidimensional wireless sensor networks
M Tissera, R Doss, G Li, L Batten
(2013), pp. 54-59, ICOIN 2013 : Proceedings of the 27th International Conference on Information Networking, Bangkok, Thailand, E1
A general cloud firewall framework with dynamic resource allocation
S Yu, R Doss, W Zhou, S Guo
(2013), pp. 1941-1945, IEEE International Conference on Communications, E1
Comparative study of routing protocols for opportunistic networks
M Alajeely, A Ahmad, R Doss
(2013), pp. 209-214, Proceedings of the International Conference on Sensing Technology, ICST, E1
Offline grouping proof protocol for RFID systems
S Sundaresan, R Doss, W Zhou
(2013), pp. 247-252, International Conference on Wireless and Mobile Computing, Networking and Communications, E1
An adaptive approach to information discovery in multi-dimensional wireless sensor networks
M Tissera, R Doss, G Li, L Batten
(2013), pp. 203-208, Proceedings of the International Conference on Sensing Technology, ICST, E1
RFID tags - Grouping proof with forward security
S Sundaresan, R Doss, W Zhou
(2013), 2013 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2013, E1
Secure ownership transfer in multi-tag/multi-owner passive RFID systems
S Sundaresan, R Doss, W Zhou
(2013), pp. 2891-2896, GLOBECOM - IEEE Global Telecommunications Conference, E1
Traceback of DDoS attacks using entropy variations
S Yu, W Zhou, R Doss, W Jia
(2012), Vol. 23, pp. 412-425, IEEE Transactions on Parallel and Distributed Systems, C1
A minimum disclosure approach to authentication and privacy in RFID systems
R Doss, W Zhou, S Sundaresan, S Yu, L Gao
(2012), Vol. 56, pp. 3401-3416, Computer Networks, C1
A secure tag ownership transfer scheme in a closed loop RFID system
R Doss, W Zhou
(2012), pp. 164-169, 2012 IEEE Wireless Communications and Networking Conference Workshops, WCNCW 2012, E1
A serverless ultra-lightweight secure search protocol for EPC Class-1 Gen-2 UHF RFID tags
S Sundaresan, R Doss, W Zhou
(2012), Vol. 2, pp. 580-585, 2012 International Conference on Computer and Information Science, ICCIS 2012 - A Conference of World Engineering, Science and Technology Congress, ESTCON 2012 - Conference Proceedings, E1
A secure search protocol based on Quadratic Residues for EPC Class-1 Gen-2 UHF RFID tags
S Sundaresan, R Doss, W Zhou
(2012), pp. 30-35, IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, E1
Implementing recovery in low-resource stationary wireless sensor networks
B Li, L Batten, R Doss
(2011), pp. 11-20, Advances in wireless, mobile networks and applications, Berlin, Germany, B1
Prevention of information harvesting in a cloud services environment
L Batten, J Abawajy, R Doss
(2011), pp. 66-72, CLOSER 2011 - Proceedings of the 1st International Conference on Cloud Computing and Services Science, E1
A novel mutual authentication scheme with minimum disclosure for RFID systems
R Doss, W Zhou, S Yu, L Gao
(2011), pp. 544-549, Proceedings of the 2011 7th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, ISSNIP 2011, E1
Network resilience in low-resource mobile wireless sensor networks
B Li, L Batten, R Doss
(2010), pp. 127-138, Security and privacy in mobile information and communication systems : second international ICST conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010 : revised selected papers, Berlin, Germany, B1
Dynamic addressing in wireless sensor networks Without location awareness
R Doss, D Chandra, L Pan, W Zhou, M Chowdhury
(2010), Vol. 26, pp. 443-460, Journal of Information Science and Engineering, C1
Information discovery in mission-critical wireless sensor networks
R Doss, R Doss, G Li, G Li, V Mak, V Mak, M Tissera, M Tissera
(2010), Vol. 54, pp. 2383-2399, Computer Networks, C1-1
Energy-Efficient Medium Access Control in Wireless Sensor Networks
Gang Li, Robin Doss
(2009), pp. 419-438, Computer Communications and Networks, B1-1
Improving the QoS for information discovery in autonomic wireless sensor networks
R Doss, G Li, V Mak, S Yu, M Chowdhury
(2009), Vol. 5, pp. 334-349, Pervasive and Mobile Computing, C1
Fast recovery from node compromise in wireless sensor networks
B Li, R Doss, L Batten, W Schott
(2009), 3rd International Conference on New Technologies, Mobility and Security, NTMS 2009, E1
Lightweight authentication for recovery in wireless sensor networks
B Li, L Batten, R Doss
(2009), pp. 465-471, MSN 2009 - 5th International Conference on Mobile Ad-hoc and Sensor Networks, E1
Information theory based detection against network behavior mimicking DDoS attacks
S Yu, W Zhou, R Doss
(2008), Vol. 12, pp. 318-321, IEEE Communications Letters, C1
The crossroads approach to information discovery in wireless sensor networks
R Doss, G Li, S Yu, V Mak, M Chowdhury
(2008), Vol. 4904 LNCS, pp. 310-321, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), C1
A transformation model for heterogeneous servers
S Yu, R Doss, T Thapngam, D Quian
(2008), pp. 665-671, Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008, E1
Exploiting affinity propagation for energy-efficient information discovery in sensor networks
R Doss, G Li
(2008), pp. 735-740, GLOBECOM - IEEE Global Telecommunications Conference, E1
Prediction based location aided routing for mobile ad hoc networks
R Chellappa Doss, A Jennings, N Shenoy
(2007), Vol. 2, pp. 91-102, International Journal of Pervasive Computing and Communications, C1
Self adjusted security architecture for mobile ad hoc networks (MANETs)
A Ghalwash, A Youssif, S Hashad, R Doss
(2007), pp. 682-687, Proceedings - 6th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2007; 1st IEEE/ACIS International Workshop on e-Activity, IWEA 2007, E1
Geographic routing with cooperative relaying and leapfrogging in wireless sensor networks
P Coronel, R Doss, W Schott
(2007), pp. 646-651, GLOBECOM - IEEE Global Telecommunications Conference, E1
Lease based addressing for event-driven wireless sensor networks
R Doss, D Chandra, L Pan, W Zhou, M Chowdhury
(2006), pp. 251-256, Proceedings - International Symposium on Computers and Communications, E1
Address reuse in wireless sensor networks
R Chellappa Doss, D Chandra, L Pan, W Zhou, M Chowdhury
(2006), pp. 329-333, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1
Topology based packet marking for IP traceback
H Alwis, R Doss, P Hewage, M Chowdhury
(2006), pp. 224-228, Proceedings of the (ATNAC) Australian Telecommunication Networks and Applications Conference, Melbourne, Australia, E1
R Doss, L Pan
(2006), pp. 409-413, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1
Energy efficient on-demand addressing for wireless sensor networks
P Hewage, R Doss, H Alwis, M Chowdhury
(2006), pp. 324-328, ATNAC : Proceedings of the Australian Telecommuncation Networks and Applications Conference, 2006, Melbourne, Victoria, E1
Reliable event transfer in wireless sensor networks deployed for emergency response
R Chellappa-Doss, D Chandra
(2005), pp. 208-213, Proceedings of the 17th IASTED International Conference on Parallel and Distributed Computing and Systems : November 14 - 16, 2005, Phoenix, AZ, USA, Phoenix, USA, E1
Route maintenance using mobility prediction for mobile ad hoc networks
B Hansolt Sathyaraj, R Chellappa Doss
(2005), Vol. 2005, pp. 96-101, 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2005, E1
Mobility prediction based routing for minimizing control overhead in mobile ad hoc networks
R Doss, A Jennings, N Shenoy
(2004), Vol. 1, pp. 27-31, Proceedings of the International Conference on Wireless Networks, ICWN'04, E1
A review of current mobility prediction techniques for ad hoc networks
R Doss, A Jennings, N Shenoy
(2004), pp. 536-542, Proceedings of the Fourth IASTED International Multi-Conference on Wireless and Optical Communications, E1
Mobility prediction for seamless mobility in wireless networks
R Doss, A Jennings, N Shenoy
(2004), pp. 435-443, INC 2004 : Proceedings of the 4th International Network Conference, Plymouth, UK, E1
A review on current work in mobility prediction for wireless networks
R Chellappa-Doss, A Jennings, N Shenoy
(2004), pp. 1-7, Proceedings of the 3rd Asian International Mobile Computing Conference, Bangkok, Thailand, E1
User mobility prediction in hybrid and ad hoc wireless networks
R Chellappa-Doss, A Jennings, N Shenoy
(2003), pp. 1-5, 2003 Australian Telecommunications Networks and Applications Conference, Melbourne, Australia, E1
Route discovery and reconstruction in mobile ad hoc networks
R Chellappa, A Jennings, N Shenoy
(2003), pp. 549-554, IEEE International Conference on Networks, ICON, E1-1
Funded Projects at Deakin
No Funded Projects at Deakin found
Supervisions
No completed student supervisions to report