Skip to main content

Research Repository

Advanced Search

All Outputs (43)

Scalable Multi-domain Trust Infrastructures for Segmented Networks (2023)
Conference Proceeding
Grierson, S., Ghaleb, B., Buchanan, W. J., Thomson, C., Maglaras, L., & Eckl, C. (in press). Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the au... Read More about Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Resolving the Decreased Rank Attack in RPL’s IoT Networks (2023)
Conference Proceeding
Ghaleb, B., Al-Duba, A., Hussain, A., Romdhani, I., & Jaroucheh, Z. (2023). Resolving the Decreased Rank Attack in RPL’s IoT Networks. In 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT) (65-68). https://doi.org/10.1109/DCOSS-IoT58021.2023.00018

The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core... Read More about Resolving the Decreased Rank Attack in RPL’s IoT Networks.

SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data (2023)
Conference Proceeding
Shahbaz Khan, M., Ahmad, J., Ali, H., Pitropakis, N., Al-Dubai, A., Ghaleb, B., & Buchanan, W. J. (in press). SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.

With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlate... Read More about SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.

A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes (2023)
Conference Proceeding
Alahamadi, H., Bouabdallah, F., Al-Dubai, A., & Ghaleb, B. (2023). A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes. In 2023 International Wireless Communications and Mobile Computing (IWCMC) (917-922). https://doi.org/10.1109/IWCMC58020.2023.10182638

Time-Slotted Medium Access Control protocols bring advantages to the scalability of LoRa networks as an alternative to the ALOHA access method. However, such Time-Slotted protocols require nodes synchronization and schedules dissemination under strin... Read More about A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes.

Crypto Assets Custody: Taxonomy, Components, and Open Challenges (2023)
Conference Proceeding
Jaroucheh, Z., & Ghaleb, B. (2023). Crypto Assets Custody: Taxonomy, Components, and Open Challenges. . https://doi.org/10.1109/icbc56567.2023.10174959

Custody plays a fundamental role for organizations and individuals seeking to access crypto assets (e.g., cryptocurrencies) and decentralized finance (DeFi) applications. Custodians store private keys and approve and sign transactions. Crypto asset t... Read More about Crypto Assets Custody: Taxonomy, Components, and Open Challenges.

An Overview of Blockchain-Based IoT Architectures and Designs (2023)
Conference Proceeding
Abubakar, M., Ali, H., Ghaleb, B., Wadhaj, I., & Buchanan, W. J. (2023). An Overview of Blockchain-Based IoT Architectures and Designs. In Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems: ICETIS 2022 Volume 1 (596-605). https://doi.org/10.1007/978-3-031-25274-7_52

In recent years there has been an increased interest in the internet of things and blockchain in both industry and academia. The blockchain is quickly becoming an important technology that will fundamentally alter the method in which people exchange... Read More about An Overview of Blockchain-Based IoT Architectures and Designs.

The Mobile Attacks Under Internet of Things Networks (2023)
Conference Proceeding
Kean, C., Ghaleb, B., Mcclelland, B., Ahmad, J., Wadhaj, I., & Thomson, C. (2023). The Mobile Attacks Under Internet of Things Networks. In Proceedings of the 2nd International Conference on Emerging Technologies and Intelligent Systems ICETIS 2022: Volume 1 (523-532). https://doi.org/10.1007/978-3-031-25274-7_44

Since the introduction of the Routing Protocol for Low Power and Lossy Networks (RPL), its security aspects have been the focus of the scientific community who reported several security flaws that left the protocol vulnerable for several attacks. In... Read More about The Mobile Attacks Under Internet of Things Networks.

A Testing Methodology for the Internet of Things Affordable IP Cameras (2022)
Book Chapter
Dzwigala, G., Ghaleb, B., Aldhaheri, T. A., Wadhaj, I., Thomson, C., & Al-Zidi, N. M. (2022). A Testing Methodology for the Internet of Things Affordable IP Cameras. In H. Sharma, V. Shrivastava, K. Kumari Bharti, & L. Wang (Eds.), . Springer. https://doi.org/10.1007/978-981-19-2130-8_37

IP cameras are becoming a cheaper and more convenient option for a lot of households, whether it being for outdoor, indoor security, or as baby or pet monitors. Their security, however, is often lacking, and there is currently no testbed that focuses... Read More about A Testing Methodology for the Internet of Things Affordable IP Cameras.

Sensitivity-Aware Configurations for High Packet Generation Rate LoRa Networks (2022)
Conference Proceeding
Alahmadi, H., Bouabdallah, F., Ghaleb, B., & Al-Dubai, A. (2022). Sensitivity-Aware Configurations for High Packet Generation Rate LoRa Networks. In 2021 20th International Conference on Ubiquitous Computing and Communications (IUCC/CIT/DSCI/SmartCNS). https://doi.org/10.1109/IUCC-CIT-DSCI-SmartCNS55181.2021.00048

In this paper, we introduce Sensitivity-Aware LoRa Configuration (SAL), a new algorithm for efficient autonomous and distributed selection of LoRa physical layer transmission parameters. The aim is to address the limitations of the currently adopted... Read More about Sensitivity-Aware Configurations for High Packet Generation Rate LoRa Networks.

Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme (2022)
Journal Article
Sher Khan, J., Koç Kayhan, S., Siddiq Ahmed, S., Ahmad, J., Ayesha Siddiqa, H., Ahmed, F., …Al Dubai, A. (2022). Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme. Wireless Personal Communications, 125, 513-530. https://doi.org/10.1007/s11277-022-09562-9

Due to the increased number of cyberattacks, numerous researchers are motivated towards the design of such schemes that can hide digital information in a signal. Watermarking is one of the promising technologies that can protect digital information.... Read More about Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme.

A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution (2022)
Journal Article
Arif, J., Khan, M. A., Ghaleb, B., Ahmad, J., Munir, A., Rashid, U., & Al-Dubai, A. Y. (2022). A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution. IEEE Access, 10, 12966-12982. https://doi.org/10.1109/access.2022.3146792

Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images’ privacy, chaos-based image encryption algorithms have been used widely to fulfil such a requirement. However, these algor... Read More about A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution.

Improved Group-Based Signaling Scheme for Mobile Nodes in the Internet of Things Networks (2021)
Conference Proceeding
Ghaleb, S. M., Man, M., Ghaleb, B., Aplop, F., Ghaleb, M., & Al-Hadi, I. A. A. (2022). Improved Group-Based Signaling Scheme for Mobile Nodes in the Internet of Things Networks. In Proceedings of International Conference on Emerging Technologies and Intelligent Systems: ICETIS 2021 Volume 2 (417-434). https://doi.org/10.1007/978-3-030-85990-9_34

One of the most important challenge in the mobility management protocols is maintaining the MN’s IP connectivity and its accessibility during its movement. Although mobility protocols have come a long way in solving this issue in IP-WSNs, they still... Read More about Improved Group-Based Signaling Scheme for Mobile Nodes in the Internet of Things Networks.

Wireless Sensor Networks (WSN) in Oil and Gas Industry: Applications, Requirements and Existing Solutions (2021)
Conference Proceeding
Wadhaj, I., Ghaleb, B., & Thomson, C. (2021). Wireless Sensor Networks (WSN) in Oil and Gas Industry: Applications, Requirements and Existing Solutions. In Proceedings of International Conference on Emerging Technologies and Intelligent Systems ICETIS 2021: Volume 2 (547-563). https://doi.org/10.1007/978-3-030-85990-9_44

Effective measurement and monitoring of certain parameters (temperature, pressure, flow etc.) is crucial for the safety and optimization of processes in the Oil and Gas Industry. Wired sensors have been extensively utilized for this purpose but are c... Read More about Wireless Sensor Networks (WSN) in Oil and Gas Industry: Applications, Requirements and Existing Solutions.

An RPL based Optimal Sensors placement in Pipeline Monitoring WSNs (2021)
Conference Proceeding
Wadhaj, I., Thomson, C., & Ghaleb, B. (2021). An RPL based Optimal Sensors placement in Pipeline Monitoring WSNs. In Proceedings of International Conference on Emerging Technologies and Intelligent Systems: ICETIS 2021 (533-546). https://doi.org/10.1007/978-3-030-85990-9_43

Compared to an ordinary sensor network, Linear Sensor Networks (LSNs) has many applications in a number of areas such as surveillance and monitoring of international boundaries for illegal crossing, river environment monitoring and roads monitoring e... Read More about An RPL based Optimal Sensors placement in Pipeline Monitoring WSNs.

A Student Advising System Using Association Rule Mining (2021)
Journal Article
Shatnawi, R., Althebyan, Q., Ghaleb, B., & Al-Maolegi, M. (2021). A Student Advising System Using Association Rule Mining. International Journal of Web-Based Learning and Teaching Technologies, 16(3), 65-78. https://doi.org/10.4018/ijwltt.20210501.oa5

Academic advising is a time-consuming activity that takes a considerable effort in guiding students to improve student performance. Traditional advising systems depend greatly on the effort of the advisor to find the best selection of courses to impr... Read More about A Student Advising System Using Association Rule Mining.

The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks (2020)
Journal Article
Mitchel, C., Ghaleb, B., Ghaleb, S. M., Jaroucheh, Z., & Al-rimy, B. A. S. (2020). The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks. International Journal of Engineering and Advanced Technology, 10(2), 66-72. https://doi.org/10.35940/ijeat.b1962.1210220

With a predicted 50 billion devices by the end of 2020, the Internet of things has grown exponentially in the last few years. This growth has seen an increasing demand for mobility support in low power and lossy sensor networks, a type of network cha... Read More about The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks.

A Comparative Performance Evaluation of A load-balancing Algorithm using Contiki: “RPL vs QU-RPL” (2020)
Journal Article
Stoyanov, S., Ghaleb, B., & Ghaleb, S. (2020). A Comparative Performance Evaluation of A load-balancing Algorithm using Contiki: “RPL vs QU-RPL”. International Journal of Advanced Trends in Computer Science and Engineering, 9(4), 6834-6839. https://doi.org/10.30534/ijatcse/2020/384942020

The RPL (Routing Protocol for Low-Power and Lossy Networks) has emerged within constrained networks as the de-facto IPv6 routing standard, which entangles many concepts that make it a complex, albeit a rather flexible protocol. However, load balancin... Read More about A Comparative Performance Evaluation of A load-balancing Algorithm using Contiki: “RPL vs QU-RPL”.

SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain (2020)
Conference Proceeding
Jaroucheh, Z., Ghaleb, B., & Buchanan, W. J. (2020). SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain. . https://doi.org/10.1109/icsa-c50368.2020.00034

The proof-of-work consensus protocol suffers from two main limitations: waste of energy and offering only probabilistic guarantees about the status of the blockchain. This paper introduces SklCoin, a new Byzantine consensus protocol and its correspon... Read More about SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain.

Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL) (2020)
Journal Article
Wadhaj, I., Ghaleb, B., Thomson, C., Al-Dubai, A., & Buchanen, B. (2020). Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL). IEEE Access, 8, 43665-43675. https://doi.org/10.1109/ACCESS.2020.2977476

Destination Advertisement Objects (DAOs) are sent upward by RPL nodes toward the DODAG root, to build the downward routing paths carrying traffic from the root to its associated nodes. This routing mechanism can be exploited by a malicious node perio... Read More about Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL).

Efficient Routing Primitives for Low-power and Lossy Networks in Internet of Things (2019)
Thesis
Ghaleb, B. Efficient Routing Primitives for Low-power and Lossy Networks in Internet of Things. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2070542

At the heart of the Internet of Things (IoTs) are the Low-power and Lossy networks (LLNs), a collection of interconnected battery-operated and resource-constrained tiny devices that enable the realization of a wide range of applications in multiple d... Read More about Efficient Routing Primitives for Low-power and Lossy Networks in Internet of Things.