Skip to main content

Research Repository

Advanced Search

All Outputs (33)

Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting (2020)
Journal Article
Abramson, W., van Deursen, N. E., & Buchanan, W. J. (2020). Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting. Blockchain in Healthcare Today, 3, https://doi.org/10.30953/bhty.v3.140

A substantial administrative burden is placed on healthcare professionals as they manage and progress through their careers. Identity verification, pre-employment screening and appraisals: the bureaucracy associated with each of these processes takes... Read More about Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting.

A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos (2020)
Journal Article
Masood, F., Boulila, W., Ahmad, J., Arshad, A., Sankar, S., Rubaiee, S., & Buchanan, W. J. (2020). A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos. Remote Sensing, 12(11), Article 1893. https://doi.org/10.3390/rs12111893

Aerial photography involves capturing images from aircraft and other flying objects, including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can contain sensitive information that requires secure processing. We proposed an... Read More about A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos.

Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation (2020)
Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2020). Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation. Forensic Science International: Digital Investigation, 33, Article 300979. https://doi.org/10.1016/j.fsidi.2020.300979

Ransomware continues to grow in both scale, cost, complexity and impact since its initial discovery nearly 30 years ago. Security practitioners are engaged in a continual "arms race" with the ransomware developers attempting to defend their digital i... Read More about Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation.

CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure (2020)
Journal Article
Kim, T.-H., Kumar, G., Saha, R., Alazab, M., Buchanan, W. J., Rai, M. K., Geetha, G., & Thomas, R. (2020). CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure. IEEE Access, 8, 94748-94756. https://doi.org/10.1109/access.2020.2995443

The increasing number of devices in the age of Internet-of-Thing (IoT) has arisen a number of problems related to security. Cryptographic processes, more precisely the signatures and the keys, increase and generate an overhead on the network resource... Read More about CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure.

SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain (2020)
Presentation / Conference Contribution
Jaroucheh, Z., Ghaleb, B., & Buchanan, W. J. (2020). SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain. . https://doi.org/10.1109/icsa-c50368.2020.00034

The proof-of-work consensus protocol suffers from two main limitations: waste of energy and offering only probabilistic guarantees about the status of the blockchain. This paper introduces SklCoin, a new Byzantine consensus protocol and its correspon... Read More about SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain.

A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect (2020)
Journal Article
Kim, T.-H., Kumar, G., Saha, R., Rai, M. K., Buchanan, W. J., Thomas, R., & Alazab, M. (2020). A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect. IEEE Access, 8, 96455-96467. https://doi.org/10.1109/access.2020.2995481

Blockchain is a technology used with the series of users in peer-to-peer transactions to utilize the usability properties of the immutable data records. The distributed nature of this technology has given the wide acceptance to its range of applicati... Read More about A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect.

Energy demand forecasting of buildings using random neural networks (2020)
Journal Article
Ahmad, J., Tahir, A., Larijani, H., Ahmed, F., Aziz Shah, S., Hall, A. J., & Buchanan, W. J. (2020). Energy demand forecasting of buildings using random neural networks. Journal of Intelligent and Fuzzy Systems, 38(4), 4753-4765. https://doi.org/10.3233/jifs-191458

Energy uncertainty and ecological pressures have contributed to a high volatility in energy demand and consumption. The building sector accounts for 30 to 40% of the total global energy consumption. There is a high demand for novel techniques and via... Read More about Energy demand forecasting of buildings using random neural networks.

A Privacy-Preserving Secure Framework for Electric Vehicles in IoT using Matching Market and Signcryption (2020)
Journal Article
Kumar, G., Rai, M., Saha, R., Buchanan, W. J., Thomas, R., Geetha, G., Kim, T.-H., & Rodrigues, J. (2020). A Privacy-Preserving Secure Framework for Electric Vehicles in IoT using Matching Market and Signcryption. IEEE Transactions on Vehicular Technology, 69(7), 7707-7722. https://doi.org/10.1109/tvt.2020.2989817

The present world of vehicle technology is inclined to develop Electric Vehicles (EVs) with various optimized features. These vehicles need frequent charging which takes a longer time to charge up. Therefore, scheduling of vehicles in charging statio... Read More about A Privacy-Preserving Secure Framework for Electric Vehicles in IoT using Matching Market and Signcryption.

Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication (2020)
Journal Article
Aziz Shah, S., Ahmad, J., Tahir, A., Ahmed, F., Russell, G., Shah, S. Y., Buchanan, W., & Abbasi, Q. H. (2020). Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication. Micromachines, 11(4), Article 379. https://doi.org/10.3390/mi11040379

Nano-scaled structures, wireless sensing, wearable devices, and wireless communications systems are anticipated to support the development of new next-generation technologies in the near future. Exponential rise in future Radio-Frequency (RF) sensing... Read More about Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication.

Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL) (2020)
Journal Article
Wadhaj, I., Ghaleb, B., Thomson, C., Al-Dubai, A., & Buchanen, B. (2020). Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL). IEEE Access, 8, 43665-43675. https://doi.org/10.1109/ACCESS.2020.2977476

Destination Advertisement Objects (DAOs) are sent upward by RPL nodes toward the DODAG root, to build the downward routing paths carrying traffic from the root to its associated nodes. This routing mechanism can be exploited by a malicious node perio... Read More about Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL).

Scenario-based creation and digital investigation of ethereum ERC20 tokens (2020)
Journal Article
Dyson, S. F., Buchanan, W. J., & Bell, L. (2020). Scenario-based creation and digital investigation of ethereum ERC20 tokens. Digital Investigation, 32, Article 200894. https://doi.org/10.1016/j.fsidi.2019.200894

This paper examines the Ethereum network in the context of an investigation. The validation of data sources is achieved through different client software on both the Ropsten network and the live block-chain. New scenarios are also used test common pa... Read More about Scenario-based creation and digital investigation of ethereum ERC20 tokens.

Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning (2020)
Presentation / Conference Contribution
Ilyas, M., Ahmad, J., Lawson, A., Khan, J. S., Tahir, A., Adeel, A., Larijani, H., Kerrouche, A., Shaikh, M. G., Buchanan, W., & Hussain, A. (2019, July). Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning. Presented at 10th International Conference, BICS 2019, Guangzhou, China

Prospective studies using longitudinal patient data can be used to help to predict responsiveness to Growth Hormone (GH) therapy and assess any suspected risks. In this paper, a novel Clinical Decision Support System (CDSS) is developed to predict gr... Read More about Height Prediction for Growth Hormone Deficiency Treatment Planning Using Deep Learning.

An authentication protocol based on chaos and zero knowledge proof (2020)
Journal Article
Major, W., Buchanan, W. J., & Ahmad, J. (2020). An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dynamics, 99, 3065-3087. https://doi.org/10.1007/s11071-020-05463-3

Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authenticated clients, without opening ports on the firewall. Advances in port knocki... Read More about An authentication protocol based on chaos and zero knowledge proof.