Skip to main content

Research Repository

Advanced Search

All Outputs (46)

Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology (2024)
Journal Article
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N., Ghaleb, B., Ullah, A., Khan, M. A., & Buchanan, W. J. (online). Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology. IEEE Transactions on Consumer Electronics, https://doi.org/10.1109/tce.2024.3415411

The rapid advancement in consumer technology has led to an exponential increase in the connected devices, resulting in an enormous and continuous flow of data, particularly the image data. This data needs to be processed, managed, and secured efficie... Read More about Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology.

SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things (2024)
Journal Article
Qathrady, M. A., Ullah, S., Alshehri, M. S., Ahmad, J., Almakdi, S., Alqhtani, S. M., Khan, M. A., & Ghaleb, B. (online). SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things. CAAI Transactions on Intelligence Technology, https://doi.org/10.1049/cit2.12352

Industrial Internet of Things (IIoT) is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial environments. Several IIoT nodes operate confidential data (such as medical, transportatio... Read More about SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things.

Two-Level Dynamic Programming-Enabled Non-Metric Data Aggregation Technique for the Internet of Things (2024)
Journal Article
Jan, S. R., Ghaleb, B., Tariq, U. U., Ali, H., Sabrina, F., & Liu, L. (2024). Two-Level Dynamic Programming-Enabled Non-Metric Data Aggregation Technique for the Internet of Things. Electronics, 13(9), Article 1651. https://doi.org/10.3390/electronics13091651

The Internet of Things (IoT) has become a transformative technological infrastructure, serving as a benchmark for automating and standardizing various activities across different domains to reduce human effort, especially in hazardous environments. I... Read More about Two-Level Dynamic Programming-Enabled Non-Metric Data Aggregation Technique for the Internet of Things.

Scalable Multi-domain Trust Infrastructures for Segmented Networks (2023)
Presentation / Conference Contribution
Grierson, S., Ghaleb, B., Buchanan, W. J., Thomson, C., Maglaras, L., & Eckl, C. (2023, November). Scalable Multi-domain Trust Infrastructures for Segmented Networks. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, UK

Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the au... Read More about Scalable Multi-domain Trust Infrastructures for Segmented Networks.

SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data (2023)
Presentation / Conference Contribution
Shahbaz Khan, M., Ahmad, J., Ali, H., Pitropakis, N., Al-Dubai, A., Ghaleb, B., & Buchanan, W. J. (2023, October). SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data. Presented at 9th International Conference on Engineering and Emerging Technologies (IEEE ICEET 2023), Istanbul, Turkey

With the advent of digital communication, securing digital images during transmission and storage has become a critical concern. The traditional s-box substitution methods often fail to effectively conceal the information within highly auto-correlate... Read More about SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data.

Resolving the Decreased Rank Attack in RPL’s IoT Networks (2023)
Presentation / Conference Contribution
Ghaleb, B., Al-Duba, A., Hussain, A., Romdhani, I., & Jaroucheh, Z. (2023, June). Resolving the Decreased Rank Attack in RPL’s IoT Networks. Presented at 19th Annual International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT 2023), Pafos, Cyprus

The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core... Read More about Resolving the Decreased Rank Attack in RPL’s IoT Networks.

A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes (2023)
Presentation / Conference Contribution
Alahamadi, H., Bouabdallah, F., Al-Dubai, A., & Ghaleb, B. (2023, June). A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes. Presented at International Wireless Communications & Mobile Computing Conference (IWCMC 2023), Marrakesh, Morocco

Time-Slotted Medium Access Control protocols bring advantages to the scalability of LoRa networks as an alternative to the ALOHA access method. However, such Time-Slotted protocols require nodes synchronization and schedules dissemination under strin... Read More about A Novel Autonomous Time-Slotted LoRa MAC Protocol with Adaptive Frame Sizes.

Crypto Assets Custody: Taxonomy, Components, and Open Challenges (2023)
Presentation / Conference Contribution
Jaroucheh, Z., & Ghaleb, B. (2023). Crypto Assets Custody: Taxonomy, Components, and Open Challenges. . https://doi.org/10.1109/icbc56567.2023.10174959

Custody plays a fundamental role for organizations and individuals seeking to access crypto assets (e.g., cryptocurrencies) and decentralized finance (DeFi) applications. Custodians store private keys and approve and sign transactions. Crypto asset t... Read More about Crypto Assets Custody: Taxonomy, Components, and Open Challenges.

The Mobile Attacks Under Internet of Things Networks (2023)
Presentation / Conference Contribution
Kean, C., Ghaleb, B., Mcclelland, B., Ahmad, J., Wadhaj, I., & Thomson, C. (2022, September). The Mobile Attacks Under Internet of Things Networks. Presented at International Conference on Emerging Technologies and Intelligent Systems, Online

Since the introduction of the Routing Protocol for Low Power and Lossy Networks (RPL), its security aspects have been the focus of the scientific community who reported several security flaws that left the protocol vulnerable for several attacks. In... Read More about The Mobile Attacks Under Internet of Things Networks.

An Overview of Blockchain-Based IoT Architectures and Designs (2023)
Presentation / Conference Contribution
Abubakar, M., Ali, H., Ghaleb, B., Wadhaj, I., & Buchanan, W. J. (2022, September). An Overview of Blockchain-Based IoT Architectures and Designs. Presented at International Conference on Emerging Technologies and Intelligent Systems, Online

In recent years there has been an increased interest in the internet of things and blockchain in both industry and academia. The blockchain is quickly becoming an important technology that will fundamentally alter the method in which people exchange... Read More about An Overview of Blockchain-Based IoT Architectures and Designs.

A Testing Methodology for the Internet of Things Affordable IP Cameras (2022)
Book Chapter
Dzwigala, G., Ghaleb, B., Aldhaheri, T. A., Wadhaj, I., Thomson, C., & Al-Zidi, N. M. (2022). A Testing Methodology for the Internet of Things Affordable IP Cameras. In H. Sharma, V. Shrivastava, K. Kumari Bharti, & L. Wang (Eds.), . Springer. https://doi.org/10.1007/978-981-19-2130-8_37

IP cameras are becoming a cheaper and more convenient option for a lot of households, whether it being for outdoor, indoor security, or as baby or pet monitors. Their security, however, is often lacking, and there is currently no testbed that focuses... Read More about A Testing Methodology for the Internet of Things Affordable IP Cameras.

Sensitivity-Aware Configurations for High Packet Generation Rate LoRa Networks (2022)
Presentation / Conference Contribution
Alahmadi, H., Bouabdallah, F., Ghaleb, B., & Al-Dubai, A. (2021, December). Sensitivity-Aware Configurations for High Packet Generation Rate LoRa Networks. Presented at 20th International Conference on Computer and Information Technology (CIT-2021), London

In this paper, we introduce Sensitivity-Aware LoRa Configuration (SAL), a new algorithm for efficient autonomous and distributed selection of LoRa physical layer transmission parameters. The aim is to address the limitations of the currently adopted... Read More about Sensitivity-Aware Configurations for High Packet Generation Rate LoRa Networks.

Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme (2022)
Journal Article
Sher Khan, J., Koç Kayhan, S., Siddiq Ahmed, S., Ahmad, J., Ayesha Siddiqa, H., Ahmed, F., Ghaleb, B., & Al Dubai, A. (2022). Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme. Wireless Personal Communications, 125, 513-530. https://doi.org/10.1007/s11277-022-09562-9

Due to the increased number of cyberattacks, numerous researchers are motivated towards the design of such schemes that can hide digital information in a signal. Watermarking is one of the promising technologies that can protect digital information.... Read More about Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme.

A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution (2022)
Journal Article
Arif, J., Khan, M. A., Ghaleb, B., Ahmad, J., Munir, A., Rashid, U., & Al-Dubai, A. Y. (2022). A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution. IEEE Access, 10, 12966-12982. https://doi.org/10.1109/access.2022.3146792

Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images’ privacy, chaos-based image encryption algorithms have been used widely to fulfil such a requirement. However, these algor... Read More about A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution.

An RPL based Optimal Sensors placement in Pipeline Monitoring WSNs (2021)
Presentation / Conference Contribution
Wadhaj, I., Thomson, C., & Ghaleb, B. (2021, June). An RPL based Optimal Sensors placement in Pipeline Monitoring WSNs. Presented at International Conference on Emerging Technologies and Intelligent Systems (ICETIS 2021), Online

Compared to an ordinary sensor network, Linear Sensor Networks (LSNs) has many applications in a number of areas such as surveillance and monitoring of international boundaries for illegal crossing, river environment monitoring and roads monitoring e... Read More about An RPL based Optimal Sensors placement in Pipeline Monitoring WSNs.

Wireless Sensor Networks (WSN) in Oil and Gas Industry: Applications, Requirements and Existing Solutions (2021)
Presentation / Conference Contribution
Wadhaj, I., Ghaleb, B., & Thomson, C. (2021, June). Wireless Sensor Networks (WSN) in Oil and Gas Industry: Applications, Requirements and Existing Solutions. Presented at International Conference on Emerging Technologies and Intelligent Systems (ICETIS 2021), Online

Effective measurement and monitoring of certain parameters (temperature, pressure, flow etc.) is crucial for the safety and optimization of processes in the Oil and Gas Industry. Wired sensors have been extensively utilized for this purpose but are c... Read More about Wireless Sensor Networks (WSN) in Oil and Gas Industry: Applications, Requirements and Existing Solutions.

Improved Group-Based Signaling Scheme for Mobile Nodes in the Internet of Things Networks (2021)
Presentation / Conference Contribution
Ghaleb, S. M., Man, M., Ghaleb, B., Aplop, F., Ghaleb, M., & Al-Hadi, I. A. A. (2021, April). Improved Group-Based Signaling Scheme for Mobile Nodes in the Internet of Things Networks. Presented at ICETIS: International Conference on Emerging Technologies and Intelligent Systems, Online

One of the most important challenge in the mobility management protocols is maintaining the MN’s IP connectivity and its accessibility during its movement. Although mobility protocols have come a long way in solving this issue in IP-WSNs, they still... Read More about Improved Group-Based Signaling Scheme for Mobile Nodes in the Internet of Things Networks.

A Student Advising System Using Association Rule Mining (2021)
Journal Article
Shatnawi, R., Althebyan, Q., Ghaleb, B., & Al-Maolegi, M. (2021). A Student Advising System Using Association Rule Mining. International Journal of Web-Based Learning and Teaching Technologies, 16(3), 65-78. https://doi.org/10.4018/ijwltt.20210501.oa5

Academic advising is a time-consuming activity that takes a considerable effort in guiding students to improve student performance. Traditional advising systems depend greatly on the effort of the advisor to find the best selection of courses to impr... Read More about A Student Advising System Using Association Rule Mining.

The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks (2020)
Journal Article
Mitchel, C., Ghaleb, B., Ghaleb, S. M., Jaroucheh, Z., & Al-rimy, B. A. S. (2020). The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks. International Journal of Engineering and Advanced Technology, 10(2), 66-72. https://doi.org/10.35940/ijeat.b1962.1210220

With a predicted 50 billion devices by the end of 2020, the Internet of things has grown exponentially in the last few years. This growth has seen an increasing demand for mobility support in low power and lossy sensor networks, a type of network cha... Read More about The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks.

A Comparative Performance Evaluation of A load-balancing Algorithm using Contiki: “RPL vs QU-RPL” (2020)
Journal Article
Stoyanov, S., Ghaleb, B., & Ghaleb, S. (2020). A Comparative Performance Evaluation of A load-balancing Algorithm using Contiki: “RPL vs QU-RPL”. International Journal of Advanced Trends in Computer Science and Engineering, 9(4), 6834-6839. https://doi.org/10.30534/ijatcse/2020/384942020

The RPL (Routing Protocol for Low-Power and Lossy Networks) has emerged within constrained networks as the de-facto IPv6 routing standard, which entangles many concepts that make it a complex, albeit a rather flexible protocol. However, load balancin... Read More about A Comparative Performance Evaluation of A load-balancing Algorithm using Contiki: “RPL vs QU-RPL”.