Skip to main content

Research Repository

Advanced Search

All Outputs (33)

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform (2022)
Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., Abramson, W., & Buchanan, W. J. (2022). Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379

Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and impro... Read More about Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.

A Survey on the Integration of Blockchain and IoT: Challenges and Opportunities (2022)
Book Chapter
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Liu, X. (2022). A Survey on the Integration of Blockchain and IoT: Challenges and Opportunities. In R. Jiang, A. Bouridane, C. Li, D. Crookes, S. Boussakta, F. Hao, & E. A. Edirisinghe (Eds.), Big Data Privacy and Security in Smart Cities (197-221). Springer. https://doi.org/10.1007/978-3-031-04424-3_11

Since Satoshi Nakamoto first introduced the blockchain as an open-source project for secure financial transactions, it has attracted the scientific community’s interest, paving the way for addressing problems in domains other than cryptocurrencies, o... Read More about A Survey on the Integration of Blockchain and IoT: Challenges and Opportunities.

The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks (2020)
Journal Article
Mitchel, C., Ghaleb, B., Ghaleb, S. M., Jaroucheh, Z., & Al-rimy, B. A. S. (2020). The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks. International Journal of Engineering and Advanced Technology, 10(2), 66-72. https://doi.org/10.35940/ijeat.b1962.1210220

With a predicted 50 billion devices by the end of 2020, the Internet of things has grown exponentially in the last few years. This growth has seen an increasing demand for mobility support in low power and lossy sensor networks, a type of network cha... Read More about The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks.

Jabber-based cross-domain efficient and privacy-ensuring context management framework. (2013)
Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2013). Jabber-based cross-domain efficient and privacy-ensuring context management framework. International Journal of Advanced Computer Science and Applications, 4, 84

In pervasive environments, context-aware applications require a global knowledge of the context information distributed in different spatial domains in order to establish context-based interactions. Therefore, the design of distributed storage, retri... Read More about Jabber-based cross-domain efficient and privacy-ensuring context management framework..

An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments (2012)
Thesis
Jaroucheh, Z. An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/5348

The concept of context-awareness is widely used in mobile and pervasive computing to reduce explicit user input and customization through the increased use of implicit input. It is considered to be the corner stone technique for developing pervasive... Read More about An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments.

Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications (2011)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., Smith, S., & Zhao, H. (2011, July). Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications. Presented at 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops

Protecting user's privacy is one of the main concerns for the deployment of pervasive computing systems in the real world. In pervasive environments, the user context information is naturally distributed among different spatial or logical domains. Ma... Read More about Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications.

An approach to domain-based scalable context management architecture in pervasive environments (2011)
Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2012). An approach to domain-based scalable context management architecture in pervasive environments. Personal and Ubiquitous Computing, 16(6), 741-755. https://doi.org/10.1007/s00779-011-0422-0

In pervasive environments, context management systems are expected to administrate large volume of contextual information that is captured from spatial to nonspatial elements. Research in context-aware computing produced a number of middleware system... Read More about An approach to domain-based scalable context management architecture in pervasive environments.

Recognize contextual situation in pervasive environments using process mining techniques (2010)
Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2011). Recognize contextual situation in pervasive environments using process mining techniques. Journal of Ambient Intelligence and Humanized Computing, 2(1), 53-69. https://doi.org/10.1007/s12652-010-0038-7

Research in pervasive computing and ambience intelligence aims to enable users to interact with the environment in a context-aware way. To achieve this, a complex set of features describing different aspects of the environment has to be captured and... Read More about Recognize contextual situation in pervasive environments using process mining techniques.

Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications (2010)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2010, August). Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications. Presented at 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology

Context-aware computing is widely accepted as a promising paradigm to enable seamless computing. Several middlewares and ontology-based models for describing context information have been developed in order to support context-aware applications. Howe... Read More about Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications.

Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes (2010)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2010, July). Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes. Presented at 2010 IEEE International Conference on Web Services

Context-awareness and adaptability are important and desirable properties of service-based processes designed to provide personalized services. Most of the existing approaches focus on the adaptation at the process instance level [1] which involves e... Read More about Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes.

CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications (2010)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2010). CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications. In CICIS'10 Proceedings (209-216). https://doi.org/10.1109/cisis.2010.21

In a pervasive environment, it is essential for computing applications to be context-aware. However, one of the major challenges is the establishment of a generic and dynamic context model. Many different approaches to modeling the context exist, but... Read More about CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications.

A Perspective on Middleware-Oriented Context-Aware Pervasive Systems (2009)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2009). A Perspective on Middleware-Oriented Context-Aware Pervasive Systems. In Proceedings - International Computer Software and Applications Conference (249-254). https://doi.org/10.1109/compsac.2009.142

The evolving concepts of mobile computing, context-awareness, and ambient intelligence are increasingly influencing user's experience of services. Therefore, the goal of this paper is to provide an overview of recent developments and implementations... Read More about A Perspective on Middleware-Oriented Context-Aware Pervasive Systems.

PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks
Presentation / Conference Contribution
Ali, H., Abubakar, M., Ahmad, J., Buchanan, W. J., & Jaroucheh, Z. (2023, November). PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, United Kingdom

In recent years, there has been a significant proliferation of industrial Internet of Things (IoT) applications, with a wide variety of use cases being developed and put into operation. As the industrial IoT landscape expands, the establishment of se... Read More about PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks.

PermutEx: Feature-Extraction-Based Permutation — A New Diffusion Scheme for Image Encryption Algorithms
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Al-Dubai, A., Jaroucheh, Z., Pitropakis, N., & Buchanan, W. J. (2023, November). PermutEx: Feature-Extraction-Based Permutation — A New Diffusion Scheme for Image Encryption Algorithms. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, United Kingdom

Traditional permutation schemes mostly focus on random scrambling of pixels, often neglecting the intrinsic image information that could enhance diffusion in image encryption algorithms. This paper introduces PermutEx, a feature-extractionbased permu... Read More about PermutEx: Feature-Extraction-Based Permutation — A New Diffusion Scheme for Image Encryption Algorithms.

Crypto Assets Custody: Taxonomy, Components, and Open Challenges
Presentation / Conference Contribution
Jaroucheh, Z., & Ghaleb, B. (2023, May). Crypto Assets Custody: Taxonomy, Components, and Open Challenges. Presented at 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Dubai, United Arab Emirates

Custody plays a fundamental role for organizations and individuals seeking to access crypto assets (e.g., cryptocurrencies) and decentralized finance (DeFi) applications. Custodians store private keys and approve and sign transactions. Crypto asset t... Read More about Crypto Assets Custody: Taxonomy, Components, and Open Challenges.

Resolving the Decreased Rank Attack in RPL’s IoT Networks
Presentation / Conference Contribution
Ghaleb, B., Al-Duba, A., Hussain, A., Romdhani, I., & Jaroucheh, Z. (2023, June). Resolving the Decreased Rank Attack in RPL’s IoT Networks. Presented at 19th Annual International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT 2023), Pafos, Cyprus

The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core... Read More about Resolving the Decreased Rank Attack in RPL’s IoT Networks.

A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Liu, X. (2022, May). A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract. Presented at 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH), Riyadh, Saudi Arabia

Two-factor authentication (2FA) is commonly used in Internet of Things (IoT) authentication to provide multi-layer protection. Tokens, often known as One-Time Passwords (OTP), are used to offer additional information. While this technique provides fl... Read More about A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract.