Skip to main content

Research Repository

Advanced Search

All Outputs (392)

Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode (2024)
Presentation / Conference Contribution
Buchanan, W., Grierson, S., & Uribe, D. (2024, February). Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode. Presented at 10th International Conference on Information Systems Security and Privacy, Rome, Italy

Biometric data is often highly sensitive, and a leak of this data can lead to serious privacy breaches. Some of the most sensitive of this type of data relates to the usage of DNA data on individuals. A leak of this type of data without consent could... Read More about Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode.

Autonomous Queue Management System in Software-defined Routers for Sensor Networks (2024)
Presentation / Conference Contribution
Yigit, Y., Maglaras, L., Karantzalos, K., Gursu, K., Ozdem, M., Buchanan, W. J., & Canberk, B. (2024, November). Autonomous Queue Management System in Software-defined Routers for Sensor Networks. Presented at 2024 IEEE 10th World Forum on Internet of Things (WF-IoT), Ottawa, Canada

Recent advancements in sensor networks, the In-ternet of Things (IoT), and machine communication technologies have led to a significant increase in network traffic across various domains. However, this growth has brought forth the critical challenge... Read More about Autonomous Queue Management System in Software-defined Routers for Sensor Networks.

A True Random Number Generator Based On Race Hazard And Jitter Of Braided And Cross-Coupled Logic Gates Using FPGA (2024)
Journal Article
Ahmed, H. O., Kim, D., & Buchanan, B. (in press). A True Random Number Generator Based On Race Hazard And Jitter Of Braided And Cross-Coupled Logic Gates Using FPGA. IEEE Access, 12, 182943-182955. https://doi.org/10.1109/ACCESS.2024.3512419

In the contemporary digital landscape, security has become a vital element of our existence. The growing volume of sensitive information being stored and transmitted over networks necessitates the implementation of robust security measures. Cryptogra... Read More about A True Random Number Generator Based On Race Hazard And Jitter Of Braided And Cross-Coupled Logic Gates Using FPGA.

DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof (2024)
Presentation / Conference Contribution
Kasimatis, D., Grierson, S., Buchanan, W. J., Eckl, C., Papadopoulos, P., Pitropakis, N., Chrysoulas, C., Thomson, C., & Ghaleb, B. (2024, September). DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof. Presented at 2024 IEEE International Conference on Cyber Security and Resilience (CSR), London, UK

Decentralised identifiers have become a standardised element of digital identity architecture, with supra-national organisations such as the European Union adopting them as a key component for a unified European digital identity ledger. This paper de... Read More about DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof.

AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks (2024)
Journal Article
Yigit, Y., Maglaras, L., Buchanan, W. J., Canberk, B., Shin, H., & Duong, T. Q. (2024). AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks. IEEE Internet of Things, 11(22), 36168-36181. https://doi.org/10.1109/jiot.2024.3455089

Digital twin technology is crucial to the development of the sixth-generation (6G) Internet of Vehicles (IoV) as it allows the monitoring and assessment of the dynamic and complicated vehicular environment. However, 6G IoV networks have critical chal... Read More about AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks.

Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains (2024)
Journal Article
Baird, I., Ghaleb, B., Wadhaj, I., Russell, G., & Buchanan, W. J. (2024). Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains. Electronics, 13(17), Article 3467. https://doi.org/10.3390/electronics13173467

In the evolving landscape of the Internet of Things (IoT), ensuring the security and integrity of data transmission remains a paramount challenge. Routing Protocol for Low-Power and Lossy Networks (RPL) is commonly utilized in IoT networks to facili... Read More about Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains.

VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography (2024)
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Ali, M., Al Dubai, A., Pitropakis, N., & Buchanan, W. J. (2024, July). VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography. Presented at 2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP), Sousse, Tunisia

In this digital era, ensuring the security of data transmission is critically important. Digital data, especially image data, needs to be secured against unauthorized access. In this regards, this paper presents a robust image encryption scheme named... Read More about VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography.

Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks (2024)
Presentation / Conference Contribution
Baird, I., Ghaleb, B., Wadhaj, I., Russell, G., & Buchanan, W. J. (2024, June). Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks. Presented at 4th International Conference on Robotics and Control Engineering, Edinburgh

This paper introduces an innovative strategy for countering Sybil and DODAG Information Solicitation (DIS) flood attacks within lightweight Internet of Things (IoT) networks. The proposed method combines a one-way hash chain with a Bloom filter, leve... Read More about Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks.

An Intelligent Digital Twin Model for Attack Detection in Zero-Touch 6G Networks (2024)
Presentation / Conference Contribution
Bolat-Akça, B., Bozkaya-Aras, E., Canberk, B., Buchanan, B., & Schmid, S. (2024, June). An Intelligent Digital Twin Model for Attack Detection in Zero-Touch 6G Networks. Presented at 2024 IEEE International Conference on Communications Workshops (ICC Workshops), Denver, CO, USA

The rapid adoption of Internet of Things (IoT) services and the increasingly stringent dependability and performance requirements are transforming next-generation wireless network management towards zero-touch 6G networks. Zero-touch management is al... Read More about An Intelligent Digital Twin Model for Attack Detection in Zero-Touch 6G Networks.

Transforming EU Governance: The Digital Integration Through EBSI and GLASS (2024)
Presentation / Conference Contribution
Kasimatis, D., Buchanan, W. J., Abubakar, M., Lo, O., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., Sayeed, S., & Sel, M. (2024, June). Transforming EU Governance: The Digital Integration Through EBSI and GLASS. Presented at 39th IFIP International Conference, Edinburgh, UK

Traditionally, government systems managed citizen identities through disconnected data systems, using simple identifiers and paper-based processes, limiting digital trust and requiring citizens to request identity verification documents. The digital... Read More about Transforming EU Governance: The Digital Integration Through EBSI and GLASS.

Enhancing Supercapacitor Electrochemical Performance with 3D Printed Cellular PEEK/MWCNT Electrodes Coated with PEDOT: PSS (2024)
Journal Article
Chandran, A. C. S., Schneider, J., Nair, R., Buchanan, B., Gadegaard, N., Hogg, R., Kumar, S., & Manjakkal, L. (in press). Enhancing Supercapacitor Electrochemical Performance with 3D Printed Cellular PEEK/MWCNT Electrodes Coated with PEDOT: PSS. ACS Omega, 9(31), 33998-34007. https://doi.org/10.1021/acsomega.4c04576

In this study, we examine the electrochemical performance of supercapacitor (SC) electrodes made from 3D-printed nanocomposites. These composites consist of multiwalled carbon nanotubes (MWCNTs) and polyether ether ketone (PEEK), coated with poly­(3,... Read More about Enhancing Supercapacitor Electrochemical Performance with 3D Printed Cellular PEEK/MWCNT Electrodes Coated with PEDOT: PSS.

Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology (2024)
Journal Article
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N., Ghaleb, B., Ullah, A., Khan, M. A., & Buchanan, W. J. (2024). Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology. IEEE Transactions on Consumer Electronics, 70(4), 7087 - 7101. https://doi.org/10.1109/tce.2024.3415411

The rapid advancement in consumer technology has led to an exponential increase in the connected devices, resulting in an enormous and continuous flow of data, particularly the image data. This data needs to be processed, managed, and secured efficie... Read More about Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology.

ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT (2024)
Presentation / Conference Contribution
Huma, Z. E., Ahmad, J., Hamadi, H. A., Ghaleb, B., Buchanan, W. J., & Jan, S. U. (2024, February). ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT. Presented at 2024 2nd International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates

The Internet of Things (IoT) has become an integral part of modern societies, with devices, networks, and applications offering industrial, economic, and social benefits. However, these devices and networks generate vast amounts of data, making them... Read More about ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT.

Detection of Ransomware (2024)
Patent
Buchanan, B., McLaren, P., Russell, G., & Tan, Z. (2024). Detection of Ransomware. US20240152616A1

The present invention relates to a computer program product, a computing device and a method of detecting a file encrypted by ransomware by identifying a file write operation for a file on the computing device and determining if a predetermined numbe... Read More about Detection of Ransomware.

PermutEx: Feature-Extraction-Based Permutation — A New Diffusion Scheme for Image Encryption Algorithms (2024)
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Al-Dubai, A., Jaroucheh, Z., Pitropakis, N., & Buchanan, W. J. (2023, November). PermutEx: Feature-Extraction-Based Permutation — A New Diffusion Scheme for Image Encryption Algorithms. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, United Kingdom

Traditional permutation schemes mostly focus on random scrambling of pixels, often neglecting the intrinsic image information that could enhance diffusion in image encryption algorithms. This paper introduces PermutEx, a feature-extractionbased permu... Read More about PermutEx: Feature-Extraction-Based Permutation — A New Diffusion Scheme for Image Encryption Algorithms.

Application of Randomness for Security and Privacy in Multi-Party Computation (2024)
Journal Article
Saha, R., Kumar, G., Geetha, G., Conti, M., & Buchanan, W. J. (2024). Application of Randomness for Security and Privacy in Multi-Party Computation. IEEE Transactions on Dependable and Secure Computing, 21(6), 5694-5705. https://doi.org/10.1109/tdsc.2024.3381959

A secure Multi-Party Computation (MPC) is one of the distributed computational methods, where it computes a function over the inputs given by more than one party jointly and keeps those inputs private from the parties involved in the process. Randomi... Read More about Application of Randomness for Security and Privacy in Multi-Party Computation.

Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks (2024)
Journal Article
Bhatti, D. S., Saleem, S., Ali, Z., Park, T.-J., Suh, B., Kamran, A., Buchanan, W. J., & Kim, K.-I. (2024). Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks. IEEE Access, 12, 41499-41516. https://doi.org/10.1109/access.2024.3377144

Wireless Sensor Networks (WSN) are deployed on a large scale and require protection from malicious energy drainage attacks, particularly those directed at the routing layer. The complexity increases during critical operations like cluster head select... Read More about Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks.

SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT (2024)
Journal Article
Alshehri, M. S., Ahmad, J., Almakdi, S., Qathrady, M. A., Ghadi, Y. Y., & Buchanan, W. J. (2024). SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT. IEEE Access, 12, https://doi.org/10.1109/access.2024.3371992

The rise of Internet of Things (IoT) has led to increased security risks, particularly from botnet attacks that exploit IoT device vulnerabilities. This situation necessitates effective Intrusion Detection Systems (IDS), that are accurate, lightweigh... Read More about SkipGateNet: A Lightweight CNN-LSTM Hybrid Model with Learnable Skip Connections for Efficient Botnet Attack Detection in IoT.

A Review of the Non-Fungible Tokens (NFT): Challenges and Opportunities (2024)
Presentation / Conference Contribution
Abubakar, M., Gunathilake, N. A., Buchanan, W. J., & O’Reilly, B. (2023, August). A Review of the Non-Fungible Tokens (NFT): Challenges and Opportunities. Presented at 13th EAI International Conference, BDTA 2023, Edinburgh

Non-Fungible Token (NFT) is an emerging blockchain-based technology. These tokens can represent digital assets, as it has proof of ownership built in. NFTs have the potential to hugely influence both the decentralised markets that exist now and the c... Read More about A Review of the Non-Fungible Tokens (NFT): Challenges and Opportunities.