Skip to main content

Research Repository

Advanced Search

All Outputs (12)

Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction (2019)
Journal Article
Lowe, I., Buchanan, W. J., Macfarlane, R., & Lo, O. (2019). Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction. Journal of Networking Technology, 10(4), 124-155. https://doi.org/10.6025/jnt/20

Bluetooth is a short-range wireless technology that provides audio and data links between personal smartphones and playback devices, such as speakers, headsets and car entertainment systems. Since its introduction in 2001, security researchers have s... Read More about Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction.

Guest Editorial Special Issue on Blockchain-Based Secure and Trusted Computing for IoT (2019)
Journal Article
Li, S., Yuan, Y., Zhang, J. J., Buchanan, B., Liu, E., & Ramadoss, R. (2019). Guest Editorial Special Issue on Blockchain-Based Secure and Trusted Computing for IoT. IEEE Transactions on Computational Social Systems, 6(6), 1369-1372. https://doi.org/10.11

The Internet of Things (IoT) is expected to connect a massive number of smart devices to the Internet. The existing centralized architecture for handling the huge volume of data created in the IoT is facing many research challenges, including securit... Read More about Guest Editorial Special Issue on Blockchain-Based Secure and Trusted Computing for IoT.

A Novel Trust Evaluation Process for Secure Localization using a Decentralized Blockchain in Wireless Sensor Networks (2019)
Journal Article
Kim, T., Goyat, R., Rai, M. K., Kumar, G., Buchanan, W. J., Saha, R., & Thomas, R. (2019). A Novel Trust Evaluation Process for Secure Localization using a Decentralized Blockchain in Wireless Sensor Networks. IEEE Access, 7, 184133-184144. https://doi.or

In this research paper, blockchain-based trust management model is proposed to enhance trust relationship among beacon nodes and to eradicate malicious nodes in Wireless Sensor Networks (WSNs). This composite trust evaluation involves behavioral-base... Read More about A Novel Trust Evaluation Process for Secure Localization using a Decentralized Blockchain in Wireless Sensor Networks.

MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features (2019)
Journal Article
Saha, R., Geetha, G., Kumar, G., Kim, T., & Buchanan, W. J. (2019). MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features. IEEE Access, 7, 172045-172054. https://doi.org/10.1109/access.2019.2956160

The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weight cryptography. As an algorithm it has been considered to be one of the fas... Read More about MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features.

Machine Learning for Health and Social Care Demographics in Scotland (2019)
Presentation / Conference Contribution
Buchanan, W. J., Smales, A., Lawson, A., & Chute, C. (2019, November). Machine Learning for Health and Social Care Demographics in Scotland. Paper presented at HEALTHINFO 2019, Valencia, Spain

This paper outlines an extensive study of applying machine learning to the analysis of publicly available health and social care data within Scotland, with a focus on learning the most significant variables involved in key health care outcome factors... Read More about Machine Learning for Health and Social Care Demographics in Scotland.

Deriving ChaCha20 Key Streams From Targeted Memory Analysis (2019)
Journal Article
McLaren, P., Buchanan, W. J., Russell, G., & Tan, Z. (2019). Deriving ChaCha20 Key Streams From Targeted Memory Analysis. Journal of Information Security and Applications, 48, Article 102372. https://doi.org/10.1016/j.jisa.2019.102372

There can be performance and vulnerability concerns with block ciphers, thus stream ciphers can used as an alternative. Although many symmetric key stream ciphers are fairly resistant to side-channel attacks, cryptographic artefacts may exist in memo... Read More about Deriving ChaCha20 Key Streams From Targeted Memory Analysis.

Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications (2019)
Presentation / Conference Contribution
Gunathilake, N. A., Buchanan, W. J., & Asif, R. (2019). Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications. . https://doi.org/10.1109/WF-IoT.2019.8767250

High/ultra-high speed data connections are currently being developed, and by the year 2020, it is expected that the 5th generation networking (5GN) should be much smarter. It would provide great quality of service (QoS) due to low latency, less imple... Read More about Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications.

A Forensic Audit of the Tor Browser Bundle (2019)
Journal Article
Muir, M., Leimich, P., & Buchanan, W. J. (2019). A Forensic Audit of the Tor Browser Bundle. Digital Investigation, 29, 118-128. https://doi.org/10.1016/j.diin.2019.03.009

The increasing use of encrypted data within file storage and in network communications leaves investigators with many challenges. One of the most challenging is the Tor protocol, as its main focus is to protect the privacy of the user, in both its lo... Read More about A Forensic Audit of the Tor Browser Bundle.

Decrypting Live SSH Traffic in Virtual Environments (2019)
Journal Article
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019). Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010

Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts required for decrypting secure communications. This paper develops the MemDe-... Read More about Decrypting Live SSH Traffic in Virtual Environments.

IoT Forensics: Amazon Echo as a Use Case (2019)
Journal Article
Li, S., Li, S., Choo, K. R., Sun, Q., Buchanan, W. J., & Cao, J. (2019). IoT Forensics: Amazon Echo as a Use Case. IEEE Internet of Things Journal, 1-11. https://doi.org/10.1109/jiot.2019.2906946

Internet of Things (IoT) are increasingly common in our society, and can be found in civilian settings as well as sensitive applications such as battlefields and national security. Given the potential of these devices to be targeted by attackers, the... Read More about IoT Forensics: Amazon Echo as a Use Case.

Top 10 Blockchain Predictions for the (Near) Future of Healthcare (2019)
Journal Article
Halamka, J. D., Alterovitz, G., Buchanan, W. J., Cenaj, T., Clauson, K. A., Dhillon, V., …Ngo, A. L. (2019). Top 10 Blockchain Predictions for the (Near) Future of Healthcare. Blockchain in Healthcare Today, 2, https://doi.org/10.30953/bhty.v2.106

To review blockchain lessons learned in 2018 and near-future predictions for blockchain in healthcare, Blockchain in Healthcare Today (BHTY) asked the world's blockchain in healthcare experts to share their insights. Here, our internationally-renowne... Read More about Top 10 Blockchain Predictions for the (Near) Future of Healthcare.

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier (2019)
Presentation / Conference Contribution
Hall, A. J., Pitropakis, N., Buchanan, W. J., & Moradpoor, N. (2019). Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier. In 2018 IEEE International Conference on Big Data (Big Data). https://doi.

Insider threats continue to present a major challenge for the information security community. Despite constant research taking place in this area; a substantial gap still exists between the requirements of this community and the solutions that are cu... Read More about Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier.