Skip to main content

Research Repository

Advanced Search

Outputs (23)

TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing (2025)
Journal Article
Ali, H., Buchanan, W. J., Ahmad, J., Abubakar, M., Khan, M. S., & Wadhaj, I. (2025). TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing. Future Internet, 17(7), Article 289. https://doi.org/10.3390/fi17070289

We introduce TrustShare, a novel blockchain-based framework designed to enable secure, privacy-preserving, and trust-aware cyber threat intelligence (CTI) sharing across organizational boundaries. Leveraging Hyperledger Fabric, the architecture suppo... Read More about TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing.

A Systematic Review of the Blockchain Technology Security Challenges and Threats Classification (2025)
Presentation / Conference Contribution
Abubakar, M. A., Onyeashie, B. I., Wadhaj, I., Leimich, P., Ali, H., & Buchanan, W. J. (2024, November). A Systematic Review of the Blockchain Technology Security Challenges and Threats Classification. Presented at 6th International Conference on Blockchain Computing and Applications (BCCA 2024), Dubai, UAE

This study provides a comprehensive overview of blockchain technology, discusses its characteristics, and explains the hierarchical structure of the blockchain. Additionally, the study provides an in-depth analysis of various security threats and vul... Read More about A Systematic Review of the Blockchain Technology Security Challenges and Threats Classification.

Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains (2024)
Journal Article
Baird, I., Ghaleb, B., Wadhaj, I., Russell, G., & Buchanan, W. J. (2024). Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains. Electronics, 13(17), Article 3467. https://doi.org/10.3390/electronics13173467

In the evolving landscape of the Internet of Things (IoT), ensuring the security and integrity of data transmission remains a paramount challenge. Routing Protocol for Low-Power and Lossy Networks (RPL) is commonly utilized in IoT networks to facili... Read More about Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains.

Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs) (2024)
Journal Article
Baird, I., Wadhaj, I., Ghaleb, B., & Thomson, C. (2024). Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs). Electronics, 13(16), Article 3314. https://doi.org/10.3390/electronics13163314

Mobile ad hoc networks (MANETs) offer a decentralized communication solution ideal for infrastructure-less environments like disaster relief zones. However, their inherent lack of central control and dynamic topology make them vulnerable to attacks.... Read More about Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs).

Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks (2024)
Presentation / Conference Contribution
Baird, I., Ghaleb, B., Wadhaj, I., Russell, G., & Buchanan, W. J. (2024, June). Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks. Presented at 4th International Conference on Robotics and Control Engineering, Edinburgh

This paper introduces an innovative strategy for countering Sybil and DODAG Information Solicitation (DIS) flood attacks within lightweight Internet of Things (IoT) networks. The proposed method combines a one-way hash chain with a Bloom filter, leve... Read More about Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks.

A Comparative Study of VANET Routing Protocols for Safety Applications (2023)
Presentation / Conference Contribution
Coyle, K., Thomson, C., Wadhaj, I., & Ghaleb, B. (2023, November). A Comparative Study of VANET Routing Protocols for Safety Applications. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh

The rapid advancement of vehicular communication technologies has led to the emergence of Vehicular AdHoc Networks (VANETs), which hold immense potential for improving road safety and traffic efficiency. VANETs enable vehicles to communicate with eac... Read More about A Comparative Study of VANET Routing Protocols for Safety Applications.

The Mobile Attacks Under Internet of Things Networks (2023)
Presentation / Conference Contribution
Kean, C., Ghaleb, B., Mcclelland, B., Ahmad, J., Wadhaj, I., & Thomson, C. (2022, September). The Mobile Attacks Under Internet of Things Networks. Presented at International Conference on Emerging Technologies and Intelligent Systems, Online

Since the introduction of the Routing Protocol for Low Power and Lossy Networks (RPL), its security aspects have been the focus of the scientific community who reported several security flaws that left the protocol vulnerable for several attacks. In... Read More about The Mobile Attacks Under Internet of Things Networks.

An Overview of Blockchain-Based IoT Architectures and Designs (2023)
Presentation / Conference Contribution
Abubakar, M., Ali, H., Ghaleb, B., Wadhaj, I., & Buchanan, W. J. (2022, September). An Overview of Blockchain-Based IoT Architectures and Designs. Presented at International Conference on Emerging Technologies and Intelligent Systems, Online

In recent years there has been an increased interest in the internet of things and blockchain in both industry and academia. The blockchain is quickly becoming an important technology that will fundamentally alter the method in which people exchange... Read More about An Overview of Blockchain-Based IoT Architectures and Designs.

A Testing Methodology for the Internet of Things Affordable IP Cameras (2022)
Book Chapter
Dzwigala, G., Ghaleb, B., Aldhaheri, T. A., Wadhaj, I., Thomson, C., & Al-Zidi, N. M. (2022). A Testing Methodology for the Internet of Things Affordable IP Cameras. In H. Sharma, V. Shrivastava, K. Kumari Bharti, & L. Wang (Eds.), . Springer. https://doi.org/10.1007/978-981-19-2130-8_37

IP cameras are becoming a cheaper and more convenient option for a lot of households, whether it being for outdoor, indoor security, or as baby or pet monitors. Their security, however, is often lacking, and there is currently no testbed that focuses... Read More about A Testing Methodology for the Internet of Things Affordable IP Cameras.

On reliable and secure RPL (routing protocol low-power and lossy networks) based monitoring and surveillance in oil and gas fields (2022)
Thesis
Wadhaj, I. On reliable and secure RPL (routing protocol low-power and lossy networks) based monitoring and surveillance in oil and gas fields. (Thesis by Publication). Edinburgh Napier University

Different efforts have been made to specify protocols and algorithms for the successful operation of the Internet of things Networks including, for instance, the Low Power and Lossy Networks (LLNs) and Linear Sensor Networks (LSNs). Into such efforts... Read More about On reliable and secure RPL (routing protocol low-power and lossy networks) based monitoring and surveillance in oil and gas fields.