Skip to main content

Research Repository

Advanced Search

Outputs (9)

Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme (2022)
Journal Article
Sher Khan, J., Koç Kayhan, S., Siddiq Ahmed, S., Ahmad, J., Ayesha Siddiqa, H., Ahmed, F., …Al Dubai, A. (2022). Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme. Wireless Personal Communications, 125, 513-530. https://doi.org/10.1007/s11277-02

Due to the increased number of cyberattacks, numerous researchers are motivated towards the design of such schemes that can hide digital information in a signal. Watermarking is one of the promising technologies that can protect digital information.... Read More about Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme.

A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution (2022)
Journal Article
Arif, J., Khan, M. A., Ghaleb, B., Ahmad, J., Munir, A., Rashid, U., & Al-Dubai, A. Y. (2022). A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution. IEEE Access, 10, 12966-12982. https://doi.org/10

Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images’ privacy, chaos-based image encryption algorithms have been used widely to fulfil such a requirement. However, these algor... Read More about A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution.

A Student Advising System Using Association Rule Mining (2021)
Journal Article
Shatnawi, R., Althebyan, Q., Ghaleb, B., & Al-Maolegi, M. (2021). A Student Advising System Using Association Rule Mining. International Journal of Web-Based Learning and Teaching Technologies, 16(3), 65-78. https://doi.org/10.4018/ijwltt.20210501.oa5

Academic advising is a time-consuming activity that takes a considerable effort in guiding students to improve student performance. Traditional advising systems depend greatly on the effort of the advisor to find the best selection of courses to impr... Read More about A Student Advising System Using Association Rule Mining.

A Comparative Performance Evaluation of A load-balancing Algorithm using Contiki: “RPL vs QU-RPL” (2020)
Journal Article
Stoyanov, S., Ghaleb, B., & Ghaleb, S. (2020). A Comparative Performance Evaluation of A load-balancing Algorithm using Contiki: “RPL vs QU-RPL”. International Journal of Advanced Trends in Computer Science and Engineering, 9(4), 6834-6839. https://do

The RPL (Routing Protocol for Low-Power and Lossy Networks) has emerged within constrained networks as the de-facto IPv6 routing standard, which entangles many concepts that make it a complex, albeit a rather flexible protocol. However, load balancin... Read More about A Comparative Performance Evaluation of A load-balancing Algorithm using Contiki: “RPL vs QU-RPL”.

Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL) (2020)
Journal Article
Wadhaj, I., Ghaleb, B., Thomson, C., Al-Dubai, A., & Buchanen, B. (2020). Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL). IEEE Access, 8, 43665-43675. https://doi.org/10.1109/ACCESS.2020.2977476

Destination Advertisement Objects (DAOs) are sent upward by RPL nodes toward the DODAG root, to build the downward routing paths carrying traffic from the root to its associated nodes. This routing mechanism can be exploited by a malicious node perio... Read More about Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL).

Addressing the DAO Insider Attack in RPL’s Internet of Things Networks (2018)
Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Qasem, M., Romdhani, I., & Mackenzie, L. (2019). Addressing the DAO Insider Attack in RPL’s Internet of Things Networks. IEEE Communications Letters, 23(1), 68-71. https://doi.org/10.1109/LCOMM.2018.2878151

In RPL routing protocol, the DAO (Destination Advertisement Object) control messages are announced by the child nodes to their parents to build downward routes. A malicious insider node can exploit this feature to send fake DAOs to its parents period... Read More about Addressing the DAO Insider Attack in RPL’s Internet of Things Networks.

A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-power and Lossy Networks: A Focus on Core Operations (2018)
Journal Article
Ghaleb, B., Al-Dubai, A. Y., Ekonomou, E., Alsarhan, A., Nasser, Y., Mackenzie, L. M., & Boukerche, A. (2019). A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-power and Lossy Networks: A Focus on Core Operations. Communicatio

Driven by the special requirements of the Low-power and Lossy Networks (LLNs), the IPv6 Routing Protocol for LLNs (RPL) was standardized by the IETF some six years ago to tackle the routing issue in such networks. Since its introduction, however, num... Read More about A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-power and Lossy Networks: A Focus on Core Operations.

A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT (2018)
Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Romdhani, I., Nasser, Y., & Boukerche, A. (2018). A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT. IEEE Internet of Things Journal, 5(6), 12. https://doi.org/10.1109/JIOT.201

In this paper, we introduce Drizzle, a new algorithm for maintaining routing information in the Low-power and Lossy Networks (LLNs). The aim is to address the limitations of the currently standardized routing maintenance (i.e. Trickle algorithm) in s... Read More about A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT.

A novel situation specific network security for Wireless Sensor Networks (2015)
Journal Article
Al-Rousan, M., Bani Yassein, M., Al-Dubai, A., Ghaleb, B., & Mahmoud, I. (2015). A novel situation specific network security for Wireless Sensor Networks. Sensors & transducers, 186(3), 33-42

Researchers have come up with many high level security protocols and key management algorithms that can be applied for different types of networks. The main characteristics of wireless sensor networks that are limited computation and power made it di... Read More about A novel situation specific network security for Wireless Sensor Networks.