Skip to main content

Research Repository

Advanced Search

Outputs (7)

Scalable Multi-domain Trust Infrastructures for Segmented Networks (2023)
Presentation / Conference Contribution
Grierson, S., Ghaleb, B., Buchanan, W. J., Thomson, C., Maglaras, L., & Eckl, C. (2023, November). Scalable Multi-domain Trust Infrastructures for Segmented Networks. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design

Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the au... Read More about Scalable Multi-domain Trust Infrastructures for Segmented Networks.

SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data (2023)
Presentation / Conference Contribution
Shahbaz Khan, M., Ahmad, J., Ali, H., Pitropakis, N., Al-Dubai, A., Ghaleb, B., & Buchanan, W. J. (2023, October). SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data. Presented at 9th International Co

With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlate... Read More about SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.

Resolving the Decreased Rank Attack in RPL’s IoT Networks (2023)
Presentation / Conference Contribution
Ghaleb, B., Al-Duba, A., Hussain, A., Romdhani, I., & Jaroucheh, Z. (2023). Resolving the Decreased Rank Attack in RPL’s IoT Networks. In 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-Io

The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core... Read More about Resolving the Decreased Rank Attack in RPL’s IoT Networks.

A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes (2023)
Presentation / Conference Contribution
Alahamadi, H., Bouabdallah, F., Al-Dubai, A., & Ghaleb, B. (2023). A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes. In 2023 International Wireless Communications and Mobile Computing (IWCMC) (917-922). https://doi.org/10.1109/

Time-Slotted Medium Access Control protocols bring advantages to the scalability of LoRa networks as an alternative to the ALOHA access method. However, such Time-Slotted protocols require nodes synchronization and schedules dissemination under strin... Read More about A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes.

Crypto Assets Custody: Taxonomy, Components, and Open Challenges (2023)
Presentation / Conference Contribution
Jaroucheh, Z., & Ghaleb, B. (2023). Crypto Assets Custody: Taxonomy, Components, and Open Challenges. . https://doi.org/10.1109/icbc56567.2023.10174959

Custody plays a fundamental role for organizations and individuals seeking to access crypto assets (e.g., cryptocurrencies) and decentralized finance (DeFi) applications. Custodians store private keys and approve and sign transactions. Crypto asset t... Read More about Crypto Assets Custody: Taxonomy, Components, and Open Challenges.

The Mobile Attacks Under Internet of Things Networks (2023)
Presentation / Conference Contribution
Kean, C., Ghaleb, B., Mcclelland, B., Ahmad, J., Wadhaj, I., & Thomson, C. (2023). The Mobile Attacks Under Internet of Things Networks. In Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems ICETIS 2022: Volu

Since the introduction of the Routing Protocol for Low Power and Lossy Networks (RPL), its security aspects have been the focus of the scientific community who reported several security flaws that left the protocol vulnerable for several attacks. In... Read More about The Mobile Attacks Under Internet of Things Networks.

An Overview of Blockchain-Based IoT Architectures and Designs (2023)
Presentation / Conference Contribution
Abubakar, M., Ali, H., Ghaleb, B., Wadhaj, I., & Buchanan, W. J. (2022, September). An Overview of Blockchain-Based IoT Architectures and Designs. Presented at International Conference on Emerging Technologies and Intelligent Systems, Online

In recent years there has been an increased interest in the internet of things and blockchain in both industry and academia. The blockchain is quickly becoming an important technology that will fundamentally alter the method in which people exchange... Read More about An Overview of Blockchain-Based IoT Architectures and Designs.