Skip to main content

Research Repository

Advanced Search

Outputs (22)

Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains (2024)
Journal Article
Baird, I., Ghaleb, B., Wadhaj, I., Russell, G., & Buchanan, W. J. (2024). Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains. Electronics, 13(17), Article 3467. https://doi.org/10.3390/electronics13173467

In the evolving landscape of the Internet of Things (IoT), ensuring the security and integrity of data transmission remains a paramount challenge. Routing Protocol for Low-Power and Lossy Networks (RPL) is commonly utilized in IoT networks to facili... Read More about Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains.

Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs) (2024)
Journal Article
Baird, I., Wadhaj, I., Ghaleb, B., & Thomson, C. (2024). Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs). Electronics, 13(16), Article 3314. https://doi.org/10.3390/electronics13163314

Mobile ad hoc networks (MANETs) offer a decentralized communication solution ideal for infrastructure-less environments like disaster relief zones. However, their inherent lack of central control and dynamic topology make them vulnerable to attacks.... Read More about Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs).

A Testing Methodology for the Internet of Things Affordable IP Cameras (2022)
Book Chapter
Dzwigala, G., Ghaleb, B., Aldhaheri, T. A., Wadhaj, I., Thomson, C., & Al-Zidi, N. M. (2022). A Testing Methodology for the Internet of Things Affordable IP Cameras. In H. Sharma, V. Shrivastava, K. Kumari Bharti, & L. Wang (Eds.), . Springer. https://doi.org/10.1007/978-981-19-2130-8_37

IP cameras are becoming a cheaper and more convenient option for a lot of households, whether it being for outdoor, indoor security, or as baby or pet monitors. Their security, however, is often lacking, and there is currently no testbed that focuses... Read More about A Testing Methodology for the Internet of Things Affordable IP Cameras.

On reliable and secure RPL (routing protocol low-power and lossy networks) based monitoring and surveillance in oil and gas fields (2022)
Thesis
Wadhaj, I. On reliable and secure RPL (routing protocol low-power and lossy networks) based monitoring and surveillance in oil and gas fields. (Thesis by Publication). Edinburgh Napier University

Different efforts have been made to specify protocols and algorithms for the successful operation of the Internet of things Networks including, for instance, the Low Power and Lossy Networks (LLNs) and Linear Sensor Networks (LSNs). Into such efforts... Read More about On reliable and secure RPL (routing protocol low-power and lossy networks) based monitoring and surveillance in oil and gas fields.

A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node (2021)
Journal Article
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2021). A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node. Wireless Networks, 27(5), 3423-3439. https://doi.org/10.1007/s11276-021-02580-8

Utilising the mobilisation of a sink node in a wireless sensor network to combat the energy hole, or hotspot issue, is well referenced. However, another issue , that of energy spikes may remain. With the mobile sink node potentially communicating wit... Read More about A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node.

Towards an Energy Balancing Solution for Wireless Sensor Network with Mobile Sink Node (2021)
Journal Article
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2021). Towards an Energy Balancing Solution for Wireless Sensor Network with Mobile Sink Node. Computer Communications, 170, 50-64. https://doi.org/10.1016/j.comcom.2021.01.011

The issue of energy holes, or hotspots, in wireless sensor networks is well referenced. As is the proposed mobilisation of the sink node in order to combat this. However, as the mobile sink node may communicate with some nodes more than others, issue... Read More about Towards an Energy Balancing Solution for Wireless Sensor Network with Mobile Sink Node.

Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL) (2020)
Journal Article
Wadhaj, I., Ghaleb, B., Thomson, C., Al-Dubai, A., & Buchanen, B. (2020). Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL). IEEE Access, 8, 43665-43675. https://doi.org/10.1109/ACCESS.2020.2977476

Destination Advertisement Objects (DAOs) are sent upward by RPL nodes toward the DODAG root, to build the downward routing paths carrying traffic from the root to its associated nodes. This routing mechanism can be exploited by a malicious node perio... Read More about Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL).

Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network (2019)
Journal Article
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2019). Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network. Sensors, 19(22), Article 4930. https://doi.org/10.3390/s19224930

The hotspot issue in wireless sensor networks, with nodes nearest the sink node losing energy fastest and degrading network lifetime, is a well referenced problem. Mobile sink nodes have been proposed as a solution to this. This does not completely r... Read More about Mobility Aware Duty Cycling Algorithm (MADCAL) A Dynamic Communication Threshold for Mobile Sink in Wireless Sensor Network.

Cooja Simulator Manual (2016)
Report
Thomson, C., Romdhani, I., Al-Dubai, A., Qasem, M., Ghaleb, B., & Wadhaj, I. (2016). Cooja Simulator Manual. Edinburgh: Edinburgh Napier University

While Cooja has been proven to be an ideal tool for the simulation of RPL in WSNs, there are challenges involved in its use, particularly in regard to a lack of documentation. The Contiki website provides an image of Instant Contiki which can then be... Read More about Cooja Simulator Manual.

The Mobile Attacks Under Internet of Things Networks
Presentation / Conference Contribution
Kean, C., Ghaleb, B., Mcclelland, B., Ahmad, J., Wadhaj, I., & Thomson, C. (2022, September). The Mobile Attacks Under Internet of Things Networks. Presented at International Conference on Emerging Technologies and Intelligent Systems, Online

Since the introduction of the Routing Protocol for Low Power and Lossy Networks (RPL), its security aspects have been the focus of the scientific community who reported several security flaws that left the protocol vulnerable for several attacks. In... Read More about The Mobile Attacks Under Internet of Things Networks.