Skip to main content

Research Repository

Advanced Search

Outputs (239)

Fuzzy-Based Distributed Protocol for Vehicle-to-Vehicle Communication (2019)
Journal Article
Hawbani, A., Torbosh, E., Wang, X., Sincak, P., Zhao, L., & Al-Dubai, A. (2021). Fuzzy-Based Distributed Protocol for Vehicle-to-Vehicle Communication. IEEE Transactions on Fuzzy Systems, 29(3), 612-626. https://doi.org/10.1109/tfuzz.2019.2957254

This paper modeled the multihop data-routing in Vehicular Ad-hoc Networks(VANET) as Multiple Criteria Decision Making (MCDM) in four steps. First, the criteria which have an impact on the performance of the network layer are captured and transformed... Read More about Fuzzy-Based Distributed Protocol for Vehicle-to-Vehicle Communication.

Developing GDPR Compliant User Data Policies for Internet of Things (2019)
Presentation / Conference Contribution
Barati, M., Petri, I., & Rana, O. F. (2019, December). Developing GDPR Compliant User Data Policies for Internet of Things. Presented at UCC '19: IEEE/ACM 12th International Conference on Utility and Cloud Computing, Auckland, New Zealand

With recent adoption of Internet of Things (IoT) technologies and their use in industry, user data privacy concerns remain a major preoccupation of regulation bodies. The European General Data Protection Regulation (GDPR) enables users to control the... Read More about Developing GDPR Compliant User Data Policies for Internet of Things.

A Novel Trust Evaluation Process for Secure Localization using a Decentralized Blockchain in Wireless Sensor Networks (2019)
Journal Article
Kim, T.-H., Goyat, R., Rai, M. K., Kumar, G., Buchanan, W. J., Saha, R., & Thomas, R. (2019). A Novel Trust Evaluation Process for Secure Localization using a Decentralized Blockchain in Wireless Sensor Networks. IEEE Access, 7, 184133-184144. https://doi.org/10.1109/access.2019.2960609

In this research paper, blockchain-based trust management model is proposed to enhance trust relationship among beacon nodes and to eradicate malicious nodes in Wireless Sensor Networks (WSNs). This composite trust evaluation involves behavioral-base... Read More about A Novel Trust Evaluation Process for Secure Localization using a Decentralized Blockchain in Wireless Sensor Networks.

A Secure Occupational Therapy Framework for Monitoring Cancer Patients’ Quality of Life (2019)
Journal Article
Abdur Rahman, M., Rashid, M. M., Le Kernec, J., Philippe, B., Barnes, S. J., Fioranelli, F., Yang, S., Romain, O., Abbasi, Q. H., Loukas, G., & Imran, M. (2019). A Secure Occupational Therapy Framework for Monitoring Cancer Patients’ Quality of Life. Sensors, 19(23), Article 5258. https://doi.org/10.3390/s19235258

Once diagnosed with cancer, a patient goes through a series of diagnosis and tests, which are referred to as “after cancer treatment”. Due to the nature of the treatment and side effects, maintaining quality of life (QoL) in the home environment is a... Read More about A Secure Occupational Therapy Framework for Monitoring Cancer Patients’ Quality of Life.

Evaluating the real-world performance of 5G fixed wireless broadband in rural areas (2019)
Presentation / Conference Contribution
Abozariba, R., Davies, E., Broadbent, M., & Race, N. (2019, September). Evaluating the real-world performance of 5G fixed wireless broadband in rural areas. Presented at 2019 IEEE 2nd 5G World Forum (5GWF), Dresden, Germany

Rural communities are often neglected in the rollout of communication infrastructure, delaying or even preventing the delivery of common digital services that are now ubiquitous in modern society. Addressing this technological gap is of paramount imp... Read More about Evaluating the real-world performance of 5G fixed wireless broadband in rural areas.

Cloud-assisted Adaptive Stream Processing from Discriminative Representations (2019)
Presentation / Conference Contribution
Ndubuaku, M., Anjum, A., & Liotta, A. (2019, October). Cloud-assisted Adaptive Stream Processing from Discriminative Representations. Presented at 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), Bari, Italy

As the streaming data generated by Internet of Things (IoT) ubiquitous sensors grow in massive scale, extracting interesting information (anomalies) in real-time becomes more challenging. Traditional systems which retrospectively perform all the proc... Read More about Cloud-assisted Adaptive Stream Processing from Discriminative Representations.

Novel Fuzzy and Game Theory Based Clustering and Decision Making for VANETs (2019)
Journal Article
Alsarhan, A., Kilani, Y., Al-Dubai, A., Zomaya, A. Y., & Hussain, A. (2020). Novel Fuzzy and Game Theory Based Clustering and Decision Making for VANETs. IEEE Transactions on Vehicular Technology, 69(2), 1568-1581. https://doi.org/10.1109/TVT.2019.2956228

Different studies have recently emphasized the importance of deploying clustering schemes in Vehicular ad hoc Network (VANET) to overcome challenging problems related to scalability, frequent topology changes, scarcity of spectrum resources, maintain... Read More about Novel Fuzzy and Game Theory Based Clustering and Decision Making for VANETs.

MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features (2019)
Journal Article
Saha, R., Geetha, G., Kumar, G., Kim, T.-H., & Buchanan, W. J. (2019). MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features. IEEE Access, 7, 172045-172054. https://doi.org/10.1109/access.2019.2956160

The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weight cryptography. As an algorithm it has been considered to be one of the fas... Read More about MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features.

Networking as an information behaviour during job search: an study of active jobseekers in the Scottish youth labour market (2019)
Journal Article
Mowbray, J., & Hall, H. (2020). Networking as an information behaviour during job search: an study of active jobseekers in the Scottish youth labour market. Journal of Documentation, 76(2), 424-439. https://doi.org/10.1108/JD-05-2019-0086

Purpose - Although social networks are considered influential to employment outcomes, little is known about the behavioural manifestation of networking during job search. To address this, the study presented here examined the role of networking among... Read More about Networking as an information behaviour during job search: an study of active jobseekers in the Scottish youth labour market.

Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed (2019)
Journal Article
Maglaras, L., Cruz, T., Ferrag, M. A., & Janicke, H. (2020). Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed. Internet Technology Letters, 3(1), Article e132. https://doi.org/10.1002/itl2.132

Security of Critical National Infrastructures (CNI) is one of the major concerns to countries both in a European and in a worldwide level. Training on scenarios that involve such systems is important to the effective handling of incidents. Experienti... Read More about Teaching the process of building an Intrusion Detection System using data from a small-scale SCADA testbed.