Skip to main content

Research Repository

Advanced Search

All Outputs (12)

A Survey on the Integration of Blockchain and IoT: Challenges and Opportunities (2022)
Book Chapter
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Liu, X. (2022). A Survey on the Integration of Blockchain and IoT: Challenges and Opportunities. In R. Jiang, A. Bouridane, C. Li, D. Crookes, S. Boussakta, F. Hao, & E. A. Edirisinghe (Eds.), Big Data Privacy and Security in Smart Cities (197-221). Cham: Springer. https://doi.org/10.1007/978-3-031-04424-3_11

Since Satoshi Nakamoto first introduced the blockchain as an open-source project for secure financial transactions, it has attracted the scientific community’s interest, paving the way for addressing problems in domains other than cryptocurrencies, o... Read More about A Survey on the Integration of Blockchain and IoT: Challenges and Opportunities.

Ontology-Based Linked Data to Support Decision Making within Universities (2022)
Journal Article
Ashour, G., Al-Dubai, A., Romdhani, I., & Alghazzawi, D. (2022). Ontology-Based Linked Data to Support Decision Making within Universities. Mathematics, 10(17), Article 3148. https://doi.org/10.3390/math10173148

In recent years, educational institutions worked hard to automate their work using more trending technologies that prove the success in supporting decision-making processes. Most the decisions in educational institutions rely on rating the academic r... Read More about Ontology-Based Linked Data to Support Decision Making within Universities.

Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher (2022)
Conference Proceeding
Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (2022). Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher. In 2022 6th International Conference on Cryptography, Security and Privacy (CSP). https://doi.org/10.1109/CSP55486.2022.00018

Lightweight cryptography is a novel diversion from conventional cryptography that targets internet-of-things (IoT) platform due to resource constraints. In comparison, it offers smaller cryptographic primitives such as shorter key sizes, block sizes... Read More about Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher.

A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract (2022)
Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Liu, X. (2022). A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract. In 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH). https://doi.org/10.1109/smarttech54121.2022.00032

Two-factor authentication (2FA) is commonly used in Internet of Things (IoT) authentication to provide multi-layer protection. Tokens, often known as One-Time Passwords (OTP), are used to offer additional information. While this technique provides fl... Read More about A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract.

A Novel Time-Slotted LoRa MAC Protocol for Scalable IoT Networks (2022)
Journal Article
Alahmadi, H., Bouabdallah, F., & Al-Dubai, A. (2022). A Novel Time-Slotted LoRa MAC Protocol for Scalable IoT Networks. Future Generation Computer Systems, 134, 287-302. https://doi.org/10.1016/j.future.2022.04.003

Long Range (LoRa) networks provide long range, cost-effective and energy-efficient communications by utilising the free unlicensed ISM band, which makes them appealing for Internet of Things (IoT) applications. However, in high density networks, reli... Read More about A Novel Time-Slotted LoRa MAC Protocol for Scalable IoT Networks.

A Novel Nomad Migration-Inspired Algorithm for Global Optimization (2022)
Journal Article
Lin, N., Fu, L., Zhao, L., Hawbani, A., Tan, Z., Al-Dubai, A., & Min, G. (2022). A Novel Nomad Migration-Inspired Algorithm for Global Optimization. Computers and Electrical Engineering, 100, Article 107862. https://doi.org/10.1016/j.compeleceng.2022.107862

Nature-inspired computing (NIC) has been widely studied for many optimization scenarios. However, miscellaneous solution space of real-world problem causes it is challenging to guarantee the global optimum. Besides, cumbersome structure and complex p... Read More about A Novel Nomad Migration-Inspired Algorithm for Global Optimization.

SDORP: SDN based Opportunistic Routing for Asynchronous Wireless Sensor Networks (2022)
Journal Article
Farooq, M., Wang, X., Hawbani, A., Zhao, L., Al-Dubai, A., & Busaileh, O. (2023). SDORP: SDN based Opportunistic Routing for Asynchronous Wireless Sensor Networks. IEEE Transactions on Mobile Computing, 22(8), 4912-4929. https://doi.org/10.1109/TMC.2022.3158695

In wireless sensor networks (WSNs), it is inappropriate to use conventional unicast routing due to the broadcast storm problem and spatial diversity of communication links. Opportunistic Routing (OR) benefits the low duty-cycled WSNs by prioritizing... Read More about SDORP: SDN based Opportunistic Routing for Asynchronous Wireless Sensor Networks.

Sensitivity-Aware Configurations for High Packet Generation Rate LoRa Networks (2022)
Conference Proceeding
Alahmadi, H., Bouabdallah, F., Ghaleb, B., & Al-Dubai, A. (2022). Sensitivity-Aware Configurations for High Packet Generation Rate LoRa Networks. In 2021 20th International Conference on Ubiquitous Computing and Communications (IUCC/CIT/DSCI/SmartCNS). https://doi.org/10.1109/IUCC-CIT-DSCI-SmartCNS55181.2021.00048

In this paper, we introduce Sensitivity-Aware LoRa Configuration (SAL), a new algorithm for efficient autonomous and distributed selection of LoRa physical layer transmission parameters. The aim is to address the limitations of the currently adopted... Read More about Sensitivity-Aware Configurations for High Packet Generation Rate LoRa Networks.

Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme (2022)
Journal Article
Sher Khan, J., Koç Kayhan, S., Siddiq Ahmed, S., Ahmad, J., Ayesha Siddiqa, H., Ahmed, F., …Al Dubai, A. (2022). Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme. Wireless Personal Communications, 125, 513-530. https://doi.org/10.1007/s11277-022-09562-9

Due to the increased number of cyberattacks, numerous researchers are motivated towards the design of such schemes that can hide digital information in a signal. Watermarking is one of the promising technologies that can protect digital information.... Read More about Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme.

Internet of Things: Concept, Implementation and Challenges (2022)
Conference Proceeding
Gunathilake, N. A., Al-Dubai, A., & Buchanan, W. J. (2022). Internet of Things: Concept, Implementation and Challenges. In Internet of Things and Its Applications: Select Proceedings of ICIA 2020 (145-155). https://doi.org/10.1007/978-981-16-7637-6_14

Through the technical advancements over five generations, today's digital communication has become much smarter, more intelligent and punctual. This causes a massive amount of continuous data collection in real-time whose analytics are later used to... Read More about Internet of Things: Concept, Implementation and Challenges.

Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates (2022)
Conference Proceeding
Abubakar, M., McCarron, P., Jaroucheh, Z., Al Dubai, A., & Buchanan, B. (2022). Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/SIN54109.2021.9699221

The COVID-19 pandemic has recently emerged as a worldwide health emergency that necessitates coordinated international measures. To contain the virus's spread, governments and health organisations raced to develop vaccines that would lower Covid-19 m... Read More about Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates.

A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution (2022)
Journal Article
Arif, J., Khan, M. A., Ghaleb, B., Ahmad, J., Munir, A., Rashid, U., & Al-Dubai, A. Y. (2022). A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution. IEEE Access, 10, 12966-12982. https://doi.org/10.1109/access.2022.3146792

Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images’ privacy, chaos-based image encryption algorithms have been used widely to fulfil such a requirement. However, these algor... Read More about A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution.