Skip to main content

Research Repository

Advanced Search

All Outputs (55)

Load Balancing Objective Function in RPL draft-qasem-roll-rpl-load-balancing-01 (2018)
Report
Qasem, M., Al-Dubai, A., Romdhani, I., & Ghaleb, B. (2018). Load Balancing Objective Function in RPL draft-qasem-roll-rpl-load-balancing-01. USA: IETF

This document proposes an extended Objective Function(OF) that balances the number of children nodes of the parent nodes to avoid the overloading problem and ensure node lifetime maximization in the IPv6 Routing Protocol for Low-Power and Lossy Net... Read More about Load Balancing Objective Function in RPL draft-qasem-roll-rpl-load-balancing-01.

Leaf-based Routing Mechanism for Low-Power and Lossy Networks (2018)
Patent
Ghaleb, B., & Al-Dubai, A. (2018). Leaf-based Routing Mechanism for Low-Power and Lossy Networks. 1800668.4. Intellectual Property Office, UK

Unlike existing solutions, our invention provides a “Leaf-Based” mechanism for establishing the Downward routes in Low-Power and Lossy Networks (LLNs) that seeks to provide a novel, scalable and efficient routing solution for LLNs, which are the back... Read More about Leaf-based Routing Mechanism for Low-Power and Lossy Networks.

Load Balancing Objective Function in RPL (Draft 2) (2017)
Report
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., Hou, J., & Jadhav, R. A. (2017). Load Balancing Objective Function in RPL (Draft 2). USA: IETF

This document proposes an extended Objective Function(OF) that balances the number of child nodes of the parent nodes to avoid the overloading problem and ensure node lifetime maximization in the IPv6 Routing Protocol for Low-Power and Lossy Ne... Read More about Load Balancing Objective Function in RPL (Draft 2).

Cooja Simulator Manual (2016)
Report
Thomson, C., Romdhani, I., Al-Dubai, A., Qasem, M., Ghaleb, B., & Wadhaj, I. (2016). Cooja Simulator Manual. Edinburgh: Edinburgh Napier University

While Cooja has been proven to be an ideal tool for the simulation of RPL in WSNs, there are challenges involved in its use, particularly in regard to a lack of documentation. The Contiki website provides an image of Instant Contiki which can then be... Read More about Cooja Simulator Manual.

A novel situation specific network security for Wireless Sensor Networks (2015)
Journal Article
Al-Rousan, M., Bani Yassein, M., Al-Dubai, A., Ghaleb, B., & Mahmoud, I. (2015). A novel situation specific network security for Wireless Sensor Networks. Sensors & transducers, 186(3), 33-42

Researchers have come up with many high level security protocols and key management algorithms that can be applied for different types of networks. The main characteristics of wireless sensor networks that are limited computation and power made it di... Read More about A novel situation specific network security for Wireless Sensor Networks.

Rotated Hybrid, Energy-Efficient and Distributed (R-HEED) Clustering Protocol in WSN (2014)
Journal Article
Mardini, W., Yassein, M. B., Khamayseh, Y., & Ghaleb, B. (2014). Rotated Hybrid, Energy-Efficient and Distributed (R-HEED) Clustering Protocol in WSN. WSEAS Transactions on Communications, 13, 275-290

Minimizing the energy consumption for data transmission is one of the most important design considerations in Wireless Sensor Networks (WSNs). The clustering approach is considered one of the most effective methods to prolong the network lifetime in... Read More about Rotated Hybrid, Energy-Efficient and Distributed (R-HEED) Clustering Protocol in WSN.

ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT
Presentation / Conference Contribution
Huma, Z. E., Ahmad, J., Hamadi, H. A., Ghaleb, B., Buchanan, W. J., & Jan, S. U. (2024, February). ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT. Presented at 2024 2nd International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates

The Internet of Things (IoT) has become an integral part of modern societies, with devices, networks, and applications offering industrial, economic, and social benefits. However, these devices and networks generate vast amounts of data, making them... Read More about ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT.

DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof
Presentation / Conference Contribution
Kasimatis, D., Grierson, S., Buchanan, W. J., Eckl, C., Papadopoulos, P., Pitropakis, N., Chrysoulas, C., Thomson, C., & Ghaleb, B. (2024, September). DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof. Presented at 2024 IEEE International Conference on Cyber Security and Resilience (CSR), London, UK

Decentralised identifiers have become a standardised element of digital identity architecture, with supra-national organisations such as the European Union adopting them as a key component for a unified European digital identity ledger. This paper de... Read More about DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof.

A Comparative Study of VANET Routing Protocols for Safety Applications
Presentation / Conference Contribution
Coyle, K., Thomson, C., Wadhaj, I., & Ghaleb, B. (2023, November). A Comparative Study of VANET Routing Protocols for Safety Applications. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh

The rapid advancement of vehicular communication technologies has led to the emergence of Vehicular AdHoc Networks (VANETs), which hold immense potential for improving road safety and traffic efficiency. VANETs enable vehicles to communicate with eac... Read More about A Comparative Study of VANET Routing Protocols for Safety Applications.

Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks
Presentation / Conference Contribution
Baird, I., Ghaleb, B., Wadhaj, I., Russell, G., & Buchanan, W. J. (2024, June). Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks. Presented at 4th International Conference on Robotics and Control Engineering, Edinburgh

This paper introduces an innovative strategy for countering Sybil and DODAG Information Solicitation (DIS) flood attacks within lightweight Internet of Things (IoT) networks. The proposed method combines a one-way hash chain with a Bloom filter, leve... Read More about Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks.

SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data
Presentation / Conference Contribution
Shahbaz Khan, M., Ahmad, J., Ali, H., Pitropakis, N., Al-Dubai, A., Ghaleb, B., & Buchanan, W. J. (2023, October). SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data. Presented at 9th International Conference on Engineering and Emerging Technologies (IEEE ICEET 2023), Istanbul, Turkey

With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlate... Read More about SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.

Crypto Assets Custody: Taxonomy, Components, and Open Challenges
Presentation / Conference Contribution
Jaroucheh, Z., & Ghaleb, B. (2023, May). Crypto Assets Custody: Taxonomy, Components, and Open Challenges. Presented at 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Dubai, United Arab Emirates

Custody plays a fundamental role for organizations and individuals seeking to access crypto assets (e.g., cryptocurrencies) and decentralized finance (DeFi) applications. Custodians store private keys and approve and sign transactions. Crypto asset t... Read More about Crypto Assets Custody: Taxonomy, Components, and Open Challenges.

ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Romdhani, I., Ahmad, J., Aldhaheri, T., & Kulkarni, S. (2024, January). ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance. Presented at 2024 International Conference on Information Networking (ICOIN), Ho Chi Minh City, Vietnam

The Routing Protocol for Low Power and Lossy Networks (RPL) plays a pivotal role in IoT communication, employing a rank-based topology to guide routing decisions. However, RPL is vulnerable to Decreased Rank Attacks, where malicious nodes illegitimat... Read More about ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance.

Scalable Multi-domain Trust Infrastructures for Segmented Networks
Presentation / Conference Contribution
Grierson, S., Ghaleb, B., Buchanan, W. J., Thomson, C., Maglaras, L., & Eckl, C. (2023, November). Scalable Multi-domain Trust Infrastructures for Segmented Networks. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, UK

Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the au... Read More about Scalable Multi-domain Trust Infrastructures for Segmented Networks.

Resolving the Decreased Rank Attack in RPL’s IoT Networks
Presentation / Conference Contribution
Ghaleb, B., Al-Duba, A., Hussain, A., Romdhani, I., & Jaroucheh, Z. (2023, June). Resolving the Decreased Rank Attack in RPL’s IoT Networks. Presented at 19th Annual International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT 2023), Pafos, Cyprus

The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core... Read More about Resolving the Decreased Rank Attack in RPL’s IoT Networks.

A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes
Presentation / Conference Contribution
Alahamadi, H., Bouabdallah, F., Al-Dubai, A., & Ghaleb, B. (2023, June). A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes. Presented at International Wireless Communications & Mobile Computing Conference (IWCMC 2023), Marrakesh, Morocco

Time-Slotted Medium Access Control protocols bring advantages to the scalability of LoRa networks as an alternative to the ALOHA access method. However, such Time-Slotted protocols require nodes synchronization and schedules dissemination under strin... Read More about A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes.

STF-RNN: Space Time Features-based Recurrent Neural Network for predicting people next location
Presentation / Conference Contribution
Al-Molegi, A., Jabreel, M., & Ghaleb, B. (2016, December). STF-RNN: Space Time Features-based Recurrent Neural Network for predicting people next location. Presented at 2016 IEEE Symposium Series on Computational Intelligence (SSCI), Athens, Greece

This paper proposes a novel model called Space Time Features-based Recurrent Neural Network (STF-RNN) for predicting people next movement based on mobility patterns obtained from GPS devices logs. Two main features are involved in model operations, n... Read More about STF-RNN: Space Time Features-based Recurrent Neural Network for predicting people next location.

A new dynamic trickle algorithm for low power and lossy networks
Presentation / Conference Contribution
Yassein, M. B., Aljawarneh, S., Masa'deh, E., Ghaleb, B., & Masa'deh, R. (2016, September). A new dynamic trickle algorithm for low power and lossy networks. Presented at 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, Morocco

The main component of Routing Protocol for Low Power and Lossy Networks (RPL) is the trickle timer algorithm. Such algorithm is used to control the flow of messages through the Internet of Things (IoT) network. However, the trickle algorithm is suffe... Read More about A new dynamic trickle algorithm for low power and lossy networks.

A New Load-Balancing Aware Objective Function for RPL's IoT Networks
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Gharib, W., Mackenzi, L., & Bani Khala, M. (2018, June). A New Load-Balancing Aware Objective Function for RPL's IoT Networks. Presented at 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Exeter

The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently standardized as the de facto solution for routing in the context of the emerging Internet of Things (IoT) paradigm. RPL, along with other standards, has provided a bas... Read More about A New Load-Balancing Aware Objective Function for RPL's IoT Networks.