Skip to main content

Research Repository

Advanced Search

All Outputs (48)

Informative Causality-based Vehicle Trajectory Prediction Architecture for Domain Generalization (2023)
Conference Proceeding
Mao, C., Zhao, L., Min, G., Hawbani, A., Al-Dubai, A. Y., & Zomaya, A. Y. (2023). Informative Causality-based Vehicle Trajectory Prediction Architecture for Domain Generalization. In GLOBECOM 2023 - 2023 IEEE Global Communications Conference. https://doi.org/10.1109/GLOBECOM54140.2023.10437409

Vehicle trajectory prediction is a promising technology for improving the performance of Cellular Vehicle-to Everything (C-V2X) applications by providing future road states. Various vehicle trajectory prediction methods have been proposed to increase... Read More about Informative Causality-based Vehicle Trajectory Prediction Architecture for Domain Generalization.

Resolving the Decreased Rank Attack in RPL’s IoT Networks (2023)
Conference Proceeding
Ghaleb, B., Al-Duba, A., Hussain, A., Romdhani, I., & Jaroucheh, Z. (2023). Resolving the Decreased Rank Attack in RPL’s IoT Networks. In 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT) (65-68). https://doi.org/10.1109/DCOSS-IoT58021.2023.00018

The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core... Read More about Resolving the Decreased Rank Attack in RPL’s IoT Networks.

SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data (2023)
Conference Proceeding
Shahbaz Khan, M., Ahmad, J., Ali, H., Pitropakis, N., Al-Dubai, A., Ghaleb, B., & Buchanan, W. J. (in press). SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.

With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlate... Read More about SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.

A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes (2023)
Conference Proceeding
Alahamadi, H., Bouabdallah, F., Al-Dubai, A., & Ghaleb, B. (2023). A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes. In 2023 International Wireless Communications and Mobile Computing (IWCMC) (917-922). https://doi.org/10.1109/IWCMC58020.2023.10182638

Time-Slotted Medium Access Control protocols bring advantages to the scalability of LoRa networks as an alternative to the ALOHA access method. However, such Time-Slotted protocols require nodes synchronization and schedules dissemination under strin... Read More about A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes.

A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models (2023)
Conference Proceeding
Almaini, A., Folz, J., Woelfl, D., Al-Dubai, A., Schramm, M., & Heigl, M. (2023). A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models. In 2023 International Wireless Communications and Mobile Computing (IWCMC) ( 890-897). https://doi.org/10.1109/IWCMC58020.2023.10183131

Due to the increasing privacy demand in data processing, Fully Homomorphic Encryption (FHE) has recently received growing attention for its ability to perform calculations over encrypted data. Since the data can be processed in encrypted form and the... Read More about A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models.

Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher (2022)
Conference Proceeding
Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (2022). Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher. In 2022 6th International Conference on Cryptography, Security and Privacy (CSP). https://doi.org/10.1109/CSP55486.2022.00018

Lightweight cryptography is a novel diversion from conventional cryptography that targets internet-of-things (IoT) platform due to resource constraints. In comparison, it offers smaller cryptographic primitives such as shorter key sizes, block sizes... Read More about Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher.

A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract (2022)
Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Liu, X. (2022). A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract. In 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH). https://doi.org/10.1109/smarttech54121.2022.00032

Two-factor authentication (2FA) is commonly used in Internet of Things (IoT) authentication to provide multi-layer protection. Tokens, often known as One-Time Passwords (OTP), are used to offer additional information. While this technique provides fl... Read More about A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract.

Sensitivity-Aware Configurations for High Packet Generation Rate LoRa Networks (2022)
Conference Proceeding
Alahmadi, H., Bouabdallah, F., Ghaleb, B., & Al-Dubai, A. (2022). Sensitivity-Aware Configurations for High Packet Generation Rate LoRa Networks. In 2021 20th International Conference on Ubiquitous Computing and Communications (IUCC/CIT/DSCI/SmartCNS). https://doi.org/10.1109/IUCC-CIT-DSCI-SmartCNS55181.2021.00048

In this paper, we introduce Sensitivity-Aware LoRa Configuration (SAL), a new algorithm for efficient autonomous and distributed selection of LoRa physical layer transmission parameters. The aim is to address the limitations of the currently adopted... Read More about Sensitivity-Aware Configurations for High Packet Generation Rate LoRa Networks.

Internet of Things: Concept, Implementation and Challenges (2022)
Conference Proceeding
Gunathilake, N. A., Al-Dubai, A., & Buchanan, W. J. (2022). Internet of Things: Concept, Implementation and Challenges. In Internet of Things and Its Applications: Select Proceedings of ICIA 2020 (145-155). https://doi.org/10.1007/978-981-16-7637-6_14

Through the technical advancements over five generations, today's digital communication has become much smarter, more intelligent and punctual. This causes a massive amount of continuous data collection in real-time whose analytics are later used to... Read More about Internet of Things: Concept, Implementation and Challenges.

Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates (2022)
Conference Proceeding
Abubakar, M., McCarron, P., Jaroucheh, Z., Al Dubai, A., & Buchanan, B. (2022). Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/SIN54109.2021.9699221

The COVID-19 pandemic has recently emerged as a worldwide health emergency that necessitates coordinated international measures. To contain the virus's spread, governments and health organisations raced to develop vaccines that would lower Covid-19 m... Read More about Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates.

Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems (2021)
Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. (2021). Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. In 2021 5th Cyber Security in Networking Conference (CSNet). https://doi.org/10.1109/csnet52717.2021.9614646

The Session Initiation Protocol (SIP) is the principal signalling protocol in Voice over IP (VoIP) systems, responsible for initialising, terminating, and maintaining sessions amongst call parties. However, the problem with the SIP protocol is that i... Read More about Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems.

A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data (2021)
Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. J. (2021). A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data. In 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS). https://doi.org/10.1109/coins51742.2021.9524172

Recent years have seen an increase in medical big data, which can be attributed to a paradigm shift experienced in medical data sharing induced by the growth of medical technology and the Internet of Things. The evidence of this potential has been pr... Read More about A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data.

A New Annulus-based Distribution Algorithm for Scalable IoT-driven LoRa Networks (2021)
Conference Proceeding
Alahmadi, H., Bouabdallah, F., & Al-Dubai, A. (2021). A New Annulus-based Distribution Algorithm for Scalable IoT-driven LoRa Networks. In ICC 2021 - IEEE International Conference on Communications. https://doi.org/10.1109/ICC42927.2021.9500407

Long-Range (LoRa) has been a major avenue for deploying the Internet of Things (IoT) in large scale environments due to its long-scale connection, energy efficiency, and cost-effectiveness. LoRa networks provide multiple configurable transmission par... Read More about A New Annulus-based Distribution Algorithm for Scalable IoT-driven LoRa Networks.

Blockchain-based identity and authentication scheme for MQTT protocol (2021)
Conference Proceeding
Abdelrazig Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Liu, X. (2021). Blockchain-based identity and authentication scheme for MQTT protocol. In ICBCT '21: 2021 The 3rd International Conference on Blockchain Technology (73-81). https://doi.org/10.1145/3460537.3460549

The publish and subscribe messaging model has proven itself as a dominant messaging paradigm for IoT systems. An example of such is the commonly used Message Queuing Telemetry Transport (MQTT) protocol. However, the security concerns with this protoc... Read More about Blockchain-based identity and authentication scheme for MQTT protocol.

Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT (2021)
Conference Proceeding
Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (2021). Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT. In 10th International Conference on Cryptography and Information Security (CRYPIS 2021) (185-205)

Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, continuous observations of physical leakages are essential to minimise vulnerabilities associated with cryptographic functions. Lightweight cryptography is a novel appr... Read More about Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT.

PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism (2020)
Conference Proceeding
Abubakar, M. A., Jaroucheh, Z., Al-Dubai, A., & Buchanan, B. (2020). PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism. In ICVISP 2020: Proceedings of the 2020 4th International Conference on Vision, Image and Signal Processing (1-8). https://doi.org/10.1145/3448823.3448875

The original consensus algorithm - Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ethereum, among many others. Nevertheless, the concept has received criticisms... Read More about PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism.

PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism (2020)
Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Buchanan, W. (2020). PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism. In ICVISP 2020: Proceedings of the 2020 4th International Conference on Vision, Image and Signal Processing. https://doi.org/10.1145/3448823.3448875

The original consensus algorithm-Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ethereum, among many others. Nevertheless, the concept has received criticisms o... Read More about PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism.

Recent Advances and Trends in Lightweight Cryptography for IoT Security (2020)
Conference Proceeding
Gunathilake, N. A., Al-Dubai, A., & Buchanan, W. J. (2020). Recent Advances and Trends in Lightweight Cryptography for IoT Security. . https://doi.org/10.23919/cnsm50824.2020.9269083

Lightweight cryptography is a novel diversion from conventional cryptography to minimise its high level of resource requirements, thus it would impeccably fit in the internet-of-things (IoT) environment. The IoT platform is constrained in terms of ph... Read More about Recent Advances and Trends in Lightweight Cryptography for IoT Security.

A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network (2020)
Conference Proceeding
Thomson, C., Wadhaj, I., Al-Dubai, A., & Tan, Z. (2020). A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network. In 2020 IEEE 6th World Forum on Internet of Things (WF-IoT). https://doi.org/10.1109/WF-IoT48130.2020.9221036

The issue of energy holes, or hotspots, in wireless sensor networks is well referenced. As is the proposed mobilisa-tion of the sink node in order to combat this. However, as the sink node shall still pass some nodes more closely and frequently than... Read More about A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network.

An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University (2020)
Conference Proceeding
Ashour, G., Al-Dubai, A., Romdhani, I., & Aljohani, N. (2020). An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University. In 2020 International Conference Engineering Technologies and Computer Science (EnT). https://doi.org/10.1109/ent48576.2020.00030

Educational data is growing continuously. This huge amount of data that is scattered and come from different resources with different formats usually is noisy, duplicated, inconsistent, and unorganized. These data can be more efficient and usable whe... Read More about An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University.