Skip to main content

Research Repository

Advanced Search

Outputs (47)

ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance (2024)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Romdhani, I., Ahmad, J., Aldhaheri, T., & Kulkarni, S. (2024, January). ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance. Presented at 2024 International Conference on Information Networking (ICOIN), Ho Chi Minh City, Vietnam

The Routing Protocol for Low Power and Lossy Networks (RPL) plays a pivotal role in IoT communication, employing a rank-based topology to guide routing decisions. However, RPL is vulnerable to Decreased Rank Attacks, where malicious nodes illegitimat... Read More about ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance.

Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology (2024)
Journal Article
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N., Ghaleb, B., Ullah, A., Khan, M. A., & Buchanan, W. J. (online). Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology. IEEE Transactions on Consumer Electronics, https://doi.org/10.1109/tce.2024.3415411

The rapid advancement in consumer technology has led to an exponential increase in the connected devices, resulting in an enormous and continuous flow of data, particularly the image data. This data needs to be processed, managed, and secured efficie... Read More about Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology.

SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things (2024)
Journal Article
Qathrady, M. A., Ullah, S., Alshehri, M. S., Ahmad, J., Almakdi, S., Alqhtani, S. M., Khan, M. A., & Ghaleb, B. (online). SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things. CAAI Transactions on Intelligence Technology, https://doi.org/10.1049/cit2.12352

Industrial Internet of Things (IIoT) is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial environments. Several IIoT nodes operate confidential data (such as medical, transportatio... Read More about SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things.

Two-Level Dynamic Programming-Enabled Non-Metric Data Aggregation Technique for the Internet of Things (2024)
Journal Article
Jan, S. R., Ghaleb, B., Tariq, U. U., Ali, H., Sabrina, F., & Liu, L. (2024). Two-Level Dynamic Programming-Enabled Non-Metric Data Aggregation Technique for the Internet of Things. Electronics, 13(9), Article 1651. https://doi.org/10.3390/electronics13091651

The Internet of Things (IoT) has become a transformative technological infrastructure, serving as a benchmark for automating and standardizing various activities across different domains to reduce human effort, especially in hazardous environments. I... Read More about Two-Level Dynamic Programming-Enabled Non-Metric Data Aggregation Technique for the Internet of Things.

Scalable Multi-domain Trust Infrastructures for Segmented Networks (2023)
Presentation / Conference Contribution
Grierson, S., Ghaleb, B., Buchanan, W. J., Thomson, C., Maglaras, L., & Eckl, C. (2023, November). Scalable Multi-domain Trust Infrastructures for Segmented Networks. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, UK

Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the au... Read More about Scalable Multi-domain Trust Infrastructures for Segmented Networks.

SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data (2023)
Presentation / Conference Contribution
Shahbaz Khan, M., Ahmad, J., Ali, H., Pitropakis, N., Al-Dubai, A., Ghaleb, B., & Buchanan, W. J. (2023, October). SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data. Presented at 9th International Conference on Engineering and Emerging Technologies (IEEE ICEET 2023), Istanbul, Turkey

With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlate... Read More about SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.

Resolving the Decreased Rank Attack in RPL’s IoT Networks (2023)
Presentation / Conference Contribution
Ghaleb, B., Al-Duba, A., Hussain, A., Romdhani, I., & Jaroucheh, Z. (2023, June). Resolving the Decreased Rank Attack in RPL’s IoT Networks. Presented at 19th Annual International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT 2023), Pafos, Cyprus

The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core... Read More about Resolving the Decreased Rank Attack in RPL’s IoT Networks.

A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes (2023)
Presentation / Conference Contribution
Alahamadi, H., Bouabdallah, F., Al-Dubai, A., & Ghaleb, B. (2023, June). A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes. Presented at International Wireless Communications & Mobile Computing Conference (IWCMC 2023), Marrakesh, Morocco

Time-Slotted Medium Access Control protocols bring advantages to the scalability of LoRa networks as an alternative to the ALOHA access method. However, such Time-Slotted protocols require nodes synchronization and schedules dissemination under strin... Read More about A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes.

Crypto Assets Custody: Taxonomy, Components, and Open Challenges (2023)
Presentation / Conference Contribution
Jaroucheh, Z., & Ghaleb, B. (2023). Crypto Assets Custody: Taxonomy, Components, and Open Challenges. . https://doi.org/10.1109/icbc56567.2023.10174959

Custody plays a fundamental role for organizations and individuals seeking to access crypto assets (e.g., cryptocurrencies) and decentralized finance (DeFi) applications. Custodians store private keys and approve and sign transactions. Crypto asset t... Read More about Crypto Assets Custody: Taxonomy, Components, and Open Challenges.

An Overview of Blockchain-Based IoT Architectures and Designs (2023)
Presentation / Conference Contribution
Abubakar, M., Ali, H., Ghaleb, B., Wadhaj, I., & Buchanan, W. J. (2022, September). An Overview of Blockchain-Based IoT Architectures and Designs. Presented at International Conference on Emerging Technologies and Intelligent Systems, Online

In recent years there has been an increased interest in the internet of things and blockchain in both industry and academia. The blockchain is quickly becoming an important technology that will fundamentally alter the method in which people exchange... Read More about An Overview of Blockchain-Based IoT Architectures and Designs.