Skip to main content

Research Repository

Advanced Search

All Outputs (169)

Ontology-Based Linked Data to Support Decision Making within Universities (2022)
Journal Article
Ashour, G., Al-Dubai, A., Romdhani, I., & Alghazzawi, D. (2022). Ontology-Based Linked Data to Support Decision Making within Universities. Mathematics, 10(17), Article 3148. https://doi.org/10.3390/math10173148

In recent years, educational institutions worked hard to automate their work using more trending technologies that prove the success in supporting decision-making processes. Most the decisions in educational institutions rely on rating the academic r... Read More about Ontology-Based Linked Data to Support Decision Making within Universities.

Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher (2022)
Presentation / Conference Contribution
Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (2022, January). Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher. Presented at 2022 IEEE 6th International Conference on Cryptography, Security and Privacy (CSP 2022), Tianjin, China

Lightweight cryptography is a novel diversion from conventional cryptography that targets internet-of-things (IoT) platform due to resource constraints. In comparison, it offers smaller cryptographic primitives such as shorter key sizes, block sizes... Read More about Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher.

A Novel Time-Slotted LoRa MAC Protocol for Scalable IoT Networks (2022)
Journal Article
Alahmadi, H., Bouabdallah, F., & Al-Dubai, A. (2022). A Novel Time-Slotted LoRa MAC Protocol for Scalable IoT Networks. Future Generation Computer Systems, 134, 287-302. https://doi.org/10.1016/j.future.2022.04.003

Long Range (LoRa) networks provide long range, cost-effective and energy-efficient communications by utilising the free unlicensed ISM band, which makes them appealing for Internet of Things (IoT) applications. However, in high density networks, reli... Read More about A Novel Time-Slotted LoRa MAC Protocol for Scalable IoT Networks.

A Novel Nomad Migration-Inspired Algorithm for Global Optimization (2022)
Journal Article
Lin, N., Fu, L., Zhao, L., Hawbani, A., Tan, Z., Al-Dubai, A., & Min, G. (2022). A Novel Nomad Migration-Inspired Algorithm for Global Optimization. Computers and Electrical Engineering, 100, Article 107862. https://doi.org/10.1016/j.compeleceng.2022.107862

Nature-inspired computing (NIC) has been widely studied for many optimization scenarios. However, miscellaneous solution space of real-world problem causes it is challenging to guarantee the global optimum. Besides, cumbersome structure and complex p... Read More about A Novel Nomad Migration-Inspired Algorithm for Global Optimization.

SDORP: SDN based Opportunistic Routing for Asynchronous Wireless Sensor Networks (2022)
Journal Article
Farooq, M., Wang, X., Hawbani, A., Zhao, L., Al-Dubai, A., & Busaileh, O. (2023). SDORP: SDN based Opportunistic Routing for Asynchronous Wireless Sensor Networks. IEEE Transactions on Mobile Computing, 22(8), 4912-4929. https://doi.org/10.1109/TMC.2022.3158695

In wireless sensor networks (WSNs), it is inappropriate to use conventional unicast routing due to the broadcast storm problem and spatial diversity of communication links. Opportunistic Routing (OR) benefits the low duty-cycled WSNs by prioritizing... Read More about SDORP: SDN based Opportunistic Routing for Asynchronous Wireless Sensor Networks.

Sensitivity-Aware Configurations for High Packet Generation Rate LoRa Networks (2022)
Presentation / Conference Contribution
Alahmadi, H., Bouabdallah, F., Ghaleb, B., & Al-Dubai, A. (2021, December). Sensitivity-Aware Configurations for High Packet Generation Rate LoRa Networks. Presented at 20th International Conference on Computer and Information Technology (CIT-2021), London

In this paper, we introduce Sensitivity-Aware LoRa Configuration (SAL), a new algorithm for efficient autonomous and distributed selection of LoRa physical layer transmission parameters. The aim is to address the limitations of the currently adopted... Read More about Sensitivity-Aware Configurations for High Packet Generation Rate LoRa Networks.

Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme (2022)
Journal Article
Sher Khan, J., Koç Kayhan, S., Siddiq Ahmed, S., Ahmad, J., Ayesha Siddiqa, H., Ahmed, F., Ghaleb, B., & Al Dubai, A. (2022). Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme. Wireless Personal Communications, 125, 513-530. https://doi.org/10.1007/s11277-022-09562-9

Due to the increased number of cyberattacks, numerous researchers are motivated towards the design of such schemes that can hide digital information in a signal. Watermarking is one of the promising technologies that can protect digital information.... Read More about Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme.

Internet of Things: Concept, Implementation and Challenges (2022)
Presentation / Conference Contribution
Gunathilake, N. A., Al-Dubai, A., & Buchanan, W. J. (2020, December). Internet of Things: Concept, Implementation and Challenges. Presented at International Conference on IoT and its Applications (ICIA) 2020, Jamshedpur, India

Through the technical advancements over five generations, today's digital communication has become much smarter, more intelligent and punctual. This causes a massive amount of continuous data collection in real-time whose analytics are later used to... Read More about Internet of Things: Concept, Implementation and Challenges.

Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates (2022)
Presentation / Conference Contribution
Abubakar, M., McCarron, P., Jaroucheh, Z., Al Dubai, A., & Buchanan, B. (2021, December). Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates. Presented at 2021 14th International Conference on Security of Information and Networks (SIN), Edinburgh

The COVID-19 pandemic has recently emerged as a worldwide health emergency that necessitates coordinated international measures. To contain the virus's spread, governments and health organisations raced to develop vaccines that would lower Covid-19 m... Read More about Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates.

A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution (2022)
Journal Article
Arif, J., Khan, M. A., Ghaleb, B., Ahmad, J., Munir, A., Rashid, U., & Al-Dubai, A. Y. (2022). A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution. IEEE Access, 10, 12966-12982. https://doi.org/10.1109/access.2022.3146792

Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images’ privacy, chaos-based image encryption algorithms have been used widely to fulfil such a requirement. However, these algor... Read More about A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution.

Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems (2021)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. (2021, October). Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. Presented at 2021 5th Cyber Security in Networking Conference (CSNet), Abu Dhabi, United Arab Emirates

The Session Initiation Protocol (SIP) is the principal signalling protocol in Voice over IP (VoIP) systems, responsible for initialising, terminating, and maintaining sessions amongst call parties. However, the problem with the SIP protocol is that i... Read More about Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems.

A Novel Prediction-Based Temporal Graph Routing Algorithm for Software-Defined Vehicular Networks (2021)
Journal Article
Zhao, L., Li, Z., Al-Dubai, A., Min, G., Li, J., Hawbani, A., & Zomaya, A. (2022). A Novel Prediction-Based Temporal Graph Routing Algorithm for Software-Defined Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems, 23(8), 13275-13290. https://doi.org/10.1109/TITS.2021.3123276

Temporal information is critical for routing computation in the vehicular network. It plays a vital role in the vehicular network. Till now, most existing routing schemes in vehicular networks consider the networks as a sequence of static graphs. We... Read More about A Novel Prediction-Based Temporal Graph Routing Algorithm for Software-Defined Vehicular Networks.

A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data (2021)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. J. (2021, August). A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data. Presented at 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), Barcelona, Spain

Recent years have seen an increase in medical big data, which can be attributed to a paradigm shift experienced in medical data sharing induced by the growth of medical technology and the Internet of Things. The evidence of this potential has been pr... Read More about A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data.

A New Annulus-based Distribution Algorithm for Scalable IoT-driven LoRa Networks (2021)
Presentation / Conference Contribution
Alahmadi, H., Bouabdallah, F., & Al-Dubai, A. (2021, June). A New Annulus-based Distribution Algorithm for Scalable IoT-driven LoRa Networks. Presented at IEEE International Conference on Communications (IEEE ICC 2021), Montreal, Canada

Long-Range (LoRa) has been a major avenue for deploying the Internet of Things (IoT) in large scale environments due to its long-scale connection, energy efficiency, and cost-effectiveness. LoRa networks provide multiple configurable transmission par... Read More about A New Annulus-based Distribution Algorithm for Scalable IoT-driven LoRa Networks.

Blockchain-based identity and authentication scheme for MQTT protocol (2021)
Presentation / Conference Contribution
Abdelrazig Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Liu, X. (2021, March). Blockchain-based identity and authentication scheme for MQTT protocol. Presented at ICBCT '21: 2021 The 3rd International Conference on Blockchain Technology, Shanghai, China

The publish and subscribe messaging model has proven itself as a dominant messaging paradigm for IoT systems. An example of such is the commonly used Message Queuing Telemetry Transport (MQTT) protocol. However, the security concerns with this protoc... Read More about Blockchain-based identity and authentication scheme for MQTT protocol.

Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT (2021)
Presentation / Conference Contribution
Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (2021). Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT. In 10th International Conference on Cryptography and Information Security (CRYPIS 2021) (185-205)

Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, continuous observations of physical leakages are essential to minimise vulnerabilities associated with cryptographic functions. Lightweight cryptography is a novel appr... Read More about Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT.

FLORA: Fuzzy Based Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs (2021)
Journal Article
Wu, W., Wang, X., Hawbani, A., Liu, P., Zhao, L., & Al-Dubai, A. (2023). FLORA: Fuzzy Based Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs. IEEE Transactions on Mobile Computing, 22(1), 253-268. https://doi.org/10.1109/TMC.2021.3074739

Existing Opportunistic routing (OR) schemes work well with asynchronous duty-cycled wireless sensor networks (WSNs), which effectively reduces the sender waiting time by broadcasting packets to a set of forwarders instead of a predetermined forwarder... Read More about FLORA: Fuzzy Based Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs.

A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node (2021)
Journal Article
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2021). A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node. Wireless Networks, 27(5), 3423-3439. https://doi.org/10.1007/s11276-021-02580-8

Utilising the mobilisation of a sink node in a wireless sensor network to combat the energy hole, or hotspot issue, is well referenced. However, another issue , that of energy spikes may remain. With the mobile sink node potentially communicating wit... Read More about A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node.

Machine Learning-driven Optimization for SVM-based Intrusion Detection System in Vehicular Ad Hoc Networks (2021)
Journal Article
Alsarhan, A., Alauthman, M., Alshdaifat, E., Al-Ghuwairi, A., & Al-Dubai, A. (2023). Machine Learning-driven Optimization for SVM-based Intrusion Detection System in Vehicular Ad Hoc Networks. Journal of Ambient Intelligence and Humanized Computing, 14(5), 6113-6122. https://doi.org/10.1007/s12652-021-02963-x

Machine Learning (ML) driven solutions have been widely used to secure wireless communications Vehicular ad hoc networks (VANETs) in recent studies. Unlike existing works, this paper applies support vector machine (SVM) for intrusion detection in VAN... Read More about Machine Learning-driven Optimization for SVM-based Intrusion Detection System in Vehicular Ad Hoc Networks.

Vehicular Computation Offloading for Industrial Mobile Edge Computing (2021)
Journal Article
Zhao, L., Yang, K., Tan, Z., Song, H., Al-Dubai, A., & Zomaya, A. (2021). Vehicular Computation Offloading for Industrial Mobile Edge Computing. IEEE Transactions on Industrial Informatics, 17(11), 7871-7881. https://doi.org/10.1109/TII.2021.3059640

Due to the limited local computation resource, industrial vehicular computation requires offloading the computation tasks with time-delay sensitive and complex demands to other intelligent devices (IDs) once the data is sensed and collected collabora... Read More about Vehicular Computation Offloading for Industrial Mobile Edge Computing.