scispace - formally typeset
Search or ask a question
Author

Adnan Mahmood

Bio: Adnan Mahmood is an academic researcher from Macquarie University. The author has contributed to research in topics: Computer science & Intelligent transportation system. The author has an hindex of 6, co-authored 49 publications receiving 166 citations. Previous affiliations of Adnan Mahmood include Universiti Malaysia Sarawak & Waterford Institute of Technology.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
TL;DR: The current state-of-the-art in the context of intelligent transportation systems (ITS) is brought forth and a software-defined heterogeneous vehicular networking (SDHVNet) architecture is proposed for ensuring a highly agile networking infrastructure to ensure rapid network innovation on-demand.
Abstract: The promising advancements in the telecommunications and automotive sectors over the years have empowered drivers with highly innovative communication and sensing capabilities, in turn paving the way for the next-generation connected and autonomous vehicles. Today, vehicles communicate wirelessly with other vehicles and vulnerable pedestrians in their immediate vicinity to share timely safety-critical information primarily for collision mitigation. Furthermore, vehicles connect with the traffic management entities via their supporting network infrastructure to become more aware of any potential hazards on the roads and for guidance pertinent to their current and anticipated speeds and travelling course to ensure more efficient traffic flows. Therefore, a secure and low-latency communication is highly indispensable in order to meet the stringent performance requirements of such safety-critical vehicular applications. However, the heterogeneity of diverse radio access technologies and inflexibility in their deployment results in network fragmentation and inefficient resource utilization, and these, therefore, act as bottlenecks in realizing the aims for a highly efficient vehicular networking architecture. In order to overcome such sorts of bottlenecks, this article brings forth the current state-of-the-art in the context of intelligent transportation systems (ITS) and subsequently proposes a software-defined heterogeneous vehicular networking (SDHVNet) architecture for ensuring a highly agile networking infrastructure to ensure rapid network innovation on-demand. Finally, a number of potential architectural challenges and their probable solutions are discussed.

58 citations

Journal ArticleDOI
TL;DR: This paper analyses the state-of-the-art in pair-wise trust prediction models in OSNs, classify them based on different factors, and proposes some future directions for researchers interested in this field.
Abstract: Level of Trust can determine which source of information is reliable and with whom we should share or from whom we should accept information. There are several applications for measuring trust in Online Social Networks (OSNs), including social spammer detection, fake news detection, retweet behaviour detection and recommender systems. Trust prediction is the process of predicting a new trust relation between two users who are not currently connected. In applications of trust, trust relations among users need to be predicted. This process faces many challenges, such as the sparsity of user-specified trust relations, the context-awareness of trust and changes in trust values over time. In this paper, we analyse the state-of-the-art in pair-wise trust prediction models in OSNs, classify them based on different factors, and propose some future directions for researchers interested in this field.

35 citations

Proceedings ArticleDOI
11 Mar 2019
TL;DR: A hybrid trust management scheme is proposed to identify malicious vehicles and to inhibit them from being elected as the cluster head of other vehicles within a group via intermittent elections to form trustworthy and resource efficient vehicular networks.
Abstract: State-of-the-art advances in vehicular communication have fostered the development of smart mobility platforms, where moving vehicles exchange safety-critical information with minimal latency, to improve passenger and pedestrian safety. It is, therefore, of paramount importance that the information that is exchanged is not only authentic, but its sender should be trustworthy. Consequently, incorrect information needs to be detected as such, and its source needs to be flagged as untrustworthy if it consistently sends incorrect information. In the case of highly dynamic vehicular networks, ignoring trustworthiness poses a serious threat to vehicular communications, especially if there is a chance that the malicious vehicle could be elected as the cluster head of other vehicles within a group. We propose a hybrid trust management scheme to identify such malicious vehicles and to inhibit them from being elected as the cluster head. The scheme encompasses a composite metric (i.e., trust values assigned to the vehicles coupled with their resource availability) for cluster head and proxy cluster head selection via intermittent elections. This approach helps to form trustworthy and resource efficient vehicular networks. Simulations of the proposed scheme have been conducted using MATLAB and are also presented in this manuscript.

32 citations

Proceedings ArticleDOI
07 Jun 2020
TL;DR: A trust computational model is proposed to extract individual trust features in a SIoT environment and results illustrate that the proposed trust-based model isolates the trustworthy and untrustworthy nodes within the network in an efficient manner.
Abstract: The Internet of Things (IoT) is an evolving network of billions of interconnected physical objects, such as, numerous sensors, smartphones, wearables, and embedded devices. These physical objects, generally referred to as the smart objects, when deployed in real-world aggregates useful information from their surrounding environment. As-of-late, this notion of IoT has been extended to incorporate the social networking facets which have led to the promising paradigm of the `Social Internet of Things' (SIoT). In SIoT, the devices operate as an autonomous agent and provide an exchange of information and services discovery in an intelligent manner by establishing social relationships among them with respect to their owners. Trust plays an important role in establishing trustworthy relationships among the physical objects and reduces probable risks in the decision making process. In this paper, a trust computational model is proposed to extract individual trust features in a SIoT environment. Furthermore, a machine learning-based heuristic is used to aggregate all the trust features in order to ascertain an aggregate trust score. Simulation results illustrate that the proposed trust-based model isolates the trustworthy and untrustworthy nodes within the network in an efficient manner.

20 citations

Proceedings ArticleDOI
01 Dec 2020
TL;DR: In this paper, the authors identify 10 key research topics and discuss the research problems and opportunities within these topics, as well as discuss the challenges and opportunities in these topics. But, they do not discuss the potential of these issues to be addressed.
Abstract: Since the term first coined in 1999 by Kevin Ashton, the Internet of Things (IoT) has gained significant momentum as a technology to connect physical objects to the Internet and to facilitate machine-to-human and machine-to-machine communications. Over the past two decades, IoT has been an active area of research and development endeavors by many technical and commercial communities. Yet, IoT technology is still not mature and many issues need to be addressed. In this paper, we identify 10 key research topics and discuss the research problems and opportunities within these topics.

19 citations


Cited by
More filters
01 Jan 2016
TL;DR: The the problem of trust is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can get it instantly.
Abstract: Thank you for reading the problem of trust. Maybe you have knowledge that, people have look hundreds times for their favorite books like this the problem of trust, but end up in malicious downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they are facing with some harmful virus inside their computer. the problem of trust is available in our book collection an online access to it is set as public so you can get it instantly. Our books collection saves in multiple locations, allowing you to get the most less latency time to download any of our books like this one. Kindly say, the the problem of trust is universally compatible with any devices to read.

153 citations

Journal ArticleDOI
TL;DR: A three-layer framework (sensing, communication and control) through which automotive security threats can be better understood is proposed, which provides the state-of-the-art review on attacks and threats relevant to the communication layer and presents countermeasures.

152 citations

Journal ArticleDOI
TL;DR: A review, analyze, and compare some of the recently proposed trust establishment and management mechanisms (from 2014 to 2019) in vehicular networks, and discusses the weaknesses and inadequacies of existing trustestablishment and management approaches when deployed in a VANET environment.
Abstract: Security and privacy will play a pivotal role in the commercialization of Vehicular Ad-hoc NETworks (VANETs). Traditionally, both cryptographic and non-cryptographic approaches have been used by researchers to address security and privacy issues and achieve secure Intelligent Transportation System (ITS) applications. However, some security goals such as trust and reputation, are still hard to achieve through conventional cryptographic approaches. Trust is the degree of certainty with which the received information is accepted and acted upon. Historically trust has been computed for both the content generator and the content itself with former known as entity trust and the latter known as data trust. Both entity and content trust are equally important to support trustworthy communication in VANET. We review, analyze, and compare some of the recently proposed trust establishment and management mechanisms (from 2014 to 2019) in vehicular networks. Furthermore, we also discuss the weaknesses and inadequacies of existing trust establishment and management approaches when deployed in a VANET environment. Finally, we discuss some future challenges that will need to be addressed for trustworthy communications in vehicular networks.

117 citations

Journal ArticleDOI
TL;DR: A blockchain-based trust management model, combined with conditional privacy-preserving announcement scheme (BTCPS), is proposed for VANETs and achieves conditional privacy since trusted authority can trace malicious vehicles’ identities in anonymous announcements with the related public addresses.
Abstract: As the infrastructure of the intelligent transportation system, vehicular ad hoc networks (VANETs) have greatly improved traffic efficiency. However, due to the openness characteristics of VANETs, trust and privacy are still two challenging issues in building a more secure network environment: it is difficult to protect the privacy of vehicles and meanwhile to determine whether the message sent by the vehicle is credible. In this article, a blockchain-based trust management model, combined with conditional privacy-preserving announcement scheme (BTCPS), is proposed for VANETs. First, an anonymous aggregate vehicular announcement protocol is designed to allow vehicles to send messages anonymously in the nonfully trusted environment to guarantee the privacy of the vehicle. Second, a blockchain-based trust management model is present to realize the message synchronization and credibility. Roadside units (RSUs) are able to calculate message reliability based on vehicles’ reputation values which are safely stored in the blockchain. In addition, BTCPS also achieves conditional privacy since trusted authority can trace malicious vehicles’ identities in anonymous announcements with the related public addresses. Finally, a mixed consensus algorithm based on proof-of-work and practical Byzantine fault tolerates algorithm is suggested for better efficiency. Security analysis and performance evaluation demonstrate that the proposed scheme is secure and effective in VANETs.

116 citations

Journal ArticleDOI
TL;DR: A novel trust model, namely, MiTM attack resistance trust model in connected vehicles (MARINE), which identifies dishonest nodes performing MiTM attacks in an efficient way as well as revokes their credentials is proposed.
Abstract: Vehicular ad hoc network (VANET), a novel technology, holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety. Connected vehicles propagate sensitive information which must be shared with the neighbors in a secure environment. However, VANET may also include dishonest nodes such as man-in-the-middle (MiTM) attackers aiming to distribute and share malicious content with the vehicles, thus polluting the network with compromised information. In this regard, establishing trust among connected vehicles can increase security as every participating vehicle will generate and propagate authentic, accurate, and trusted content within the network. In this article, we propose a novel trust model, namely, MiTM attack resistance trust model in connected vehicles (MARINE), which identifies dishonest nodes performing MiTM attacks in an efficient way as well as revokes their credentials. Every node running MARINE system first establishes trust for the sender by performing multidimensional plausibility checks. Once the receiver verifies the trustworthiness of the sender, the received data are then evaluated both directly and indirectly. Extensive simulations are carried out to evaluate the performance and accuracy of MARINE rigorously across three MiTM attacker models and the benchmarked trust model. The simulation results show that for a network containing 35% of MiTM attackers, MARINE outperforms the state-of-the-art trust model by 15%, 18%, and 17% improvements in precision, recall, and $F$ -score, respectively.

93 citations