Skip to main content

Research Repository

Advanced Search

Outputs (31)

Resolving the Decreased Rank Attack in RPL’s IoT Networks (2023)
Conference Proceeding
Ghaleb, B., Al-Duba, A., Hussain, A., Romdhani, I., & Jaroucheh, Z. (2023). Resolving the Decreased Rank Attack in RPL’s IoT Networks. In 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT) (65-68). https://doi.org/10.1109/DCOSS-IoT58021.2023.00018

The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core... Read More about Resolving the Decreased Rank Attack in RPL’s IoT Networks.

Crypto Assets Custody: Taxonomy, Components, and Open Challenges (2023)
Conference Proceeding
Jaroucheh, Z., & Ghaleb, B. (2023). Crypto Assets Custody: Taxonomy, Components, and Open Challenges. . https://doi.org/10.1109/icbc56567.2023.10174959

Custody plays a fundamental role for organizations and individuals seeking to access crypto assets (e.g., cryptocurrencies) and decentralized finance (DeFi) applications. Custodians store private keys and approve and sign transactions. Crypto asset t... Read More about Crypto Assets Custody: Taxonomy, Components, and Open Challenges.

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform (2022)
Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., …Buchanan, W. J. (2022). Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379

Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and impro... Read More about Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.

A Survey on the Integration of Blockchain and IoT: Challenges and Opportunities (2022)
Book Chapter
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Liu, X. (2022). A Survey on the Integration of Blockchain and IoT: Challenges and Opportunities. In R. Jiang, A. Bouridane, C. Li, D. Crookes, S. Boussakta, F. Hao, & E. A. Edirisinghe (Eds.), Big Data Privacy and Security in Smart Cities (197-221). Cham: Springer. https://doi.org/10.1007/978-3-031-04424-3_11

Since Satoshi Nakamoto first introduced the blockchain as an open-source project for secure financial transactions, it has attracted the scientific community’s interest, paving the way for addressing problems in domains other than cryptocurrencies, o... Read More about A Survey on the Integration of Blockchain and IoT: Challenges and Opportunities.

A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract (2022)
Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Liu, X. (2022). A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract. In 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH). https://doi.org/10.1109/smarttech54121.2022.00032

Two-factor authentication (2FA) is commonly used in Internet of Things (IoT) authentication to provide multi-layer protection. Tokens, often known as One-Time Passwords (OTP), are used to offer additional information. While this technique provides fl... Read More about A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract.

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers (2022)
Conference Proceeding
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2022). Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. In IEEE SINCONF: 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699366

Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the... Read More about Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.

Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates (2022)
Conference Proceeding
Abubakar, M., McCarron, P., Jaroucheh, Z., Al Dubai, A., & Buchanan, B. (2022). Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/SIN54109.2021.9699221

The COVID-19 pandemic has recently emerged as a worldwide health emergency that necessitates coordinated international measures. To contain the virus's spread, governments and health organisations raced to develop vaccines that would lower Covid-19 m... Read More about Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates.

Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles (2021)
Conference Proceeding
Cutajar, O., Moradpoor, N., & Jaroucheh, Z. (2021). Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/SIN54109.2021.9699326

In a perfect world, coordination and cooperation across distributed autonomous systems would be a trivial task. However, incomplete information, malicious actors and real-world conditions can provide challenges which bring the trust-worthiness of par... Read More about Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles.

Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems (2021)
Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. (2021). Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. In 2021 5th Cyber Security in Networking Conference (CSNet). https://doi.org/10.1109/csnet52717.2021.9614646

The Session Initiation Protocol (SIP) is the principal signalling protocol in Voice over IP (VoIP) systems, responsible for initialising, terminating, and maintaining sessions amongst call parties. However, the problem with the SIP protocol is that i... Read More about Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems.

A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data (2021)
Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. J. (2021). A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data. In 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS). https://doi.org/10.1109/coins51742.2021.9524172

Recent years have seen an increase in medical big data, which can be attributed to a paradigm shift experienced in medical data sharing induced by the growth of medical technology and the Internet of Things. The evidence of this potential has been pr... Read More about A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data.