Skip to main content

Research Repository

Advanced Search

Outputs (25)

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform (2022)
Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., Abramson, W., & Buchanan, W. J. (2022). Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379

Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and impro... Read More about Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.

Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates (2022)
Presentation / Conference Contribution
Abubakar, M., McCarron, P., Jaroucheh, Z., Al Dubai, A., & Buchanan, B. (2021, December). Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates. Presented at 2021 14th International Conference on Security of Information and Networks (SIN), Edinburgh

The COVID-19 pandemic has recently emerged as a worldwide health emergency that necessitates coordinated international measures. To contain the virus's spread, governments and health organisations raced to develop vaccines that would lower Covid-19 m... Read More about Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates.

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers (2022)
Presentation / Conference Contribution
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2021, December). Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. Presented at IEEE SINCONF: 14th International Conference on Security of Information and Networks, Edinburgh

Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the... Read More about Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.

Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles (2021)
Presentation / Conference Contribution
Cutajar, O., Moradpoor, N., & Jaroucheh, Z. (2021, December). Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles. Presented at SINCONF 2021: 14th International Conference on Security of Information and Networks, Edinburgh (Online)

In a perfect world, coordination and cooperation across distributed autonomous systems would be a trivial task. However, incomplete information, malicious actors and real-world conditions can provide challenges which bring the trust-worthiness of par... Read More about Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles.

Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems (2021)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. (2021, October). Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. Presented at 2021 5th Cyber Security in Networking Conference (CSNet), Abu Dhabi, United Arab Emirates

The Session Initiation Protocol (SIP) is the principal signalling protocol in Voice over IP (VoIP) systems, responsible for initialising, terminating, and maintaining sessions amongst call parties. However, the problem with the SIP protocol is that i... Read More about Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems.

A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data (2021)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. J. (2021, August). A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data. Presented at 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), Barcelona, Spain

Recent years have seen an increase in medical big data, which can be attributed to a paradigm shift experienced in medical data sharing induced by the growth of medical technology and the Internet of Things. The evidence of this potential has been pr... Read More about A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data.

Blockchain-based identity and authentication scheme for MQTT protocol (2021)
Presentation / Conference Contribution
Abdelrazig Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Liu, X. (2021, March). Blockchain-based identity and authentication scheme for MQTT protocol. Presented at ICBCT '21: 2021 The 3rd International Conference on Blockchain Technology, Shanghai, China

The publish and subscribe messaging model has proven itself as a dominant messaging paradigm for IoT systems. An example of such is the commonly used Message Queuing Telemetry Transport (MQTT) protocol. However, the security concerns with this protoc... Read More about Blockchain-based identity and authentication scheme for MQTT protocol.

Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution (2021)
Presentation / Conference Contribution
Jaroucheh, Z., & Álvarez, I. A. (2021, May). Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution. Presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney, Australia

Secrets such as passwords, encryption keys, and certificates are used to assist in protecting access to resources such as computing devices, customer data and other information. Unauthorised access to resources can cause significant disruption and/or... Read More about Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution.

Programming Languages: A Usage-based Statistical Analysis and Visualization (2021)
Presentation / Conference Contribution
Orlowska, A., Chrysoulas, C., Jaroucheh, Z., & Liu, X. (2021, March). Programming Languages: A Usage-based Statistical Analysis and Visualization. Presented at ICISS 2021: 2021 The 4th International Conference on Information Science and Systems, Edinburgh

Understanding the popularity, and its trend, of programming languages can be important to anticipate which languages are best studied for future use, which are widely supported for use in enterprise projects, and investigate which skills are easiest... Read More about Programming Languages: A Usage-based Statistical Analysis and Visualization.

PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism (2020)
Presentation / Conference Contribution
Abubakar, M. A., Jaroucheh, Z., Al-Dubai, A., & Buchanan, B. (2020, November). PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism. Presented at 4th International Conference on Vision, Image and Signal Processing, Newcastle, UK

The original consensus algorithm - Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ethereum, among many others. Nevertheless, the concept has received criticisms... Read More about PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism.