Skip to main content

Research Repository

Advanced Search

Prof Bill Buchanan's Outputs (398)

FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures (2020)
Journal Article
Popov, S., & Buchanan, W. J. (2021). FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures. Journal of Parallel and Distributed Computing, 147, 77-86. https://doi.org/10.1016/j.jpdc.2020.09.002

This paper presents a novel leaderless protocol (FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures) with a low communicational complexity and which allows a set of nodes to come to a consensus on a value of a single bit. The paper... Read More about FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures.

Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems (2025)
Presentation / Conference Contribution
Korac, S., Maglaras, L., Moradpoor, N., Kioskli, K., Buchanan, W., & Canberk, B. (2025, June). Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems. Presented at IEEE DCOSS-IoT 2025, Tuscany (Lucca), Italy

Ransomware has been predominantly a threat to Windows systems. But, Linux systems became interesting for cybercriminals and this trend is expected to continue. This endangers IoT ecosystems, whereas many IoT systems are based on Linux (e.g. cloud inf... Read More about Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems.

Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0 (2025)
Presentation / Conference Contribution
Connell, J., Kasimatis, D., Papadopoulos, P., Buchanan, W. J., Sarigiannidis, P., & Pitropakis, N. (2024, June). Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0. Presented at International Conference on Cybersecurity, Situational Awareness and Social Media (Cyber Science 2024), Edinburgh, UK

Recent instances have brought to light the inherent vulnerability of the manufacturing sector to cyber security threats, particularly within the food and beverage industries. With the rapid adoption of Industry 4.0, supply chains are exposed to an ex... Read More about Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0.

LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts (2025)
Journal Article
Kumar, G., Saha, R., Conti, M., & Buchanan, W. J. (online). LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts. IEEE Transactions on Services Computing, https://doi.org/10.1109/tsc.2025.3562323

Smart contracts are integral to decentralized systems like blockchains and enable the automation of processes through programmable conditions. However, their immutability, once deployed, poses challenges when addressing errors or bugs. Existing solut... Read More about LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts.

Post-Quantum Migration of the Tor Application (2025)
Journal Article
Berger, D., Lemoudden, M., & Buchanan, W. J. (2025). Post-Quantum Migration of the Tor Application. Journal of Cybersecurity and Privacy, 5(2), Article 13. https://doi.org/10.3390/jcp5020013

The efficiency of Shor's and Grover's algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one's privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decr... Read More about Post-Quantum Migration of the Tor Application.

Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques (2025)
Journal Article
Konstantinou, A., Kasimatis, D., Buchanan, W. J., Ullah Jan, S., Ahmad, J., Politis, I., & Pitropakis, N. (2025). Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques. Machine Learning and Knowledge Extraction, 7(2), Article 31. https://doi.org/10.3390/make7020031

This paper explores the potential use of Large Language Models (LLMs), such as ChatGPT, Google Gemini, and Microsoft Copilot, in threat hunting, specifically focusing on Living off the Land (LotL) techniques. LotL methods allow threat actors to blend... Read More about Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques.

A Systematic Review of the Blockchain Technology Security Challenges and Threats Classification (2025)
Presentation / Conference Contribution
Abubakar, M. A., Onyeashie, B. I., Wadhaj, I., Leimich, P., Ali, H., & Buchanan, W. J. (2024, November). A Systematic Review of the Blockchain Technology Security Challenges and Threats Classification. Presented at 6th International Conference on Blockchain Computing and Applications (BCCA 2024), Dubai, UAE

This study provides a comprehensive overview of blockchain technology, discusses its characteristics, and explains the hierarchical structure of the blockchain. Additionally, the study provides an in-depth analysis of various security threats and vul... Read More about A Systematic Review of the Blockchain Technology Security Challenges and Threats Classification.

Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode (2024)
Presentation / Conference Contribution
Buchanan, W., Grierson, S., & Uribe, D. (2024, February). Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode. Presented at 10th International Conference on Information Systems Security and Privacy, Rome, Italy

Biometric data is often highly sensitive, and a leak of this data can lead to serious privacy breaches. Some of the most sensitive of this type of data relates to the usage of DNA data on individuals. A leak of this type of data without consent could... Read More about Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode.

Autonomous Queue Management System in Software-defined Routers for Sensor Networks (2024)
Presentation / Conference Contribution
Yigit, Y., Maglaras, L., Karantzalos, K., Gursu, K., Ozdem, M., Buchanan, W. J., & Canberk, B. (2024, November). Autonomous Queue Management System in Software-defined Routers for Sensor Networks. Presented at 2024 IEEE 10th World Forum on Internet of Things (WF-IoT), Ottawa, Canada

Recent advancements in sensor networks, the In-ternet of Things (IoT), and machine communication technologies have led to a significant increase in network traffic across various domains. However, this growth has brought forth the critical challenge... Read More about Autonomous Queue Management System in Software-defined Routers for Sensor Networks.

A True Random Number Generator Based On Race Hazard And Jitter Of Braided And Cross-Coupled Logic Gates Using FPGA (2024)
Journal Article
Ahmed, H. O., Kim, D., & Buchanan, B. (in press). A True Random Number Generator Based On Race Hazard And Jitter Of Braided And Cross-Coupled Logic Gates Using FPGA. IEEE Access, 12, 182943-182955. https://doi.org/10.1109/ACCESS.2024.3512419

In the contemporary digital landscape, security has become a vital element of our existence. The growing volume of sensitive information being stored and transmitted over networks necessitates the implementation of robust security measures. Cryptogra... Read More about A True Random Number Generator Based On Race Hazard And Jitter Of Braided And Cross-Coupled Logic Gates Using FPGA.

A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments (2024)
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N., Driss, M., & Buchanan, W. J. (2024, September). A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments. Presented at 28th International Conference on Knowledge Based and Intelligent information and Engineering Systems (KES 2024), Spain

With the widespread use of the Internet of Things (IoT), securing the storage and transmission of multimedia content across IoT devices is a critical concern. Chaos-based Pseudo-Random Number Generators (PRNGs) play an essential role in enhancing the... Read More about A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments.

DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof (2024)
Presentation / Conference Contribution
Kasimatis, D., Grierson, S., Buchanan, W. J., Eckl, C., Papadopoulos, P., Pitropakis, N., Chrysoulas, C., Thomson, C., & Ghaleb, B. (2024, September). DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof. Presented at 2024 IEEE International Conference on Cyber Security and Resilience (CSR), London, UK

Decentralised identifiers have become a standardised element of digital identity architecture, with supra-national organisations such as the European Union adopting them as a key component for a unified European digital identity ledger. This paper de... Read More about DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof.

AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks (2024)
Journal Article
Yigit, Y., Maglaras, L., Buchanan, W. J., Canberk, B., Shin, H., & Duong, T. Q. (2024). AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks. IEEE Internet of Things, 11(22), 36168-36181. https://doi.org/10.1109/jiot.2024.3455089

Digital twin technology is crucial to the development of the sixth-generation (6G) Internet of Vehicles (IoV) as it allows the monitoring and assessment of the dynamic and complicated vehicular environment. However, 6G IoV networks have critical chal... Read More about AI-Enhanced Digital Twin Framework for Cyber-Resilient 6G Internet of Vehicles Networks.

Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains (2024)
Journal Article
Baird, I., Ghaleb, B., Wadhaj, I., Russell, G., & Buchanan, W. J. (2024). Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains. Electronics, 13(17), Article 3467. https://doi.org/10.3390/electronics13173467

In the evolving landscape of the Internet of Things (IoT), ensuring the security and integrity of data transmission remains a paramount challenge. Routing Protocol for Low-Power and Lossy Networks (RPL) is commonly utilized in IoT networks to facili... Read More about Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains.

VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography (2024)
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Ali, M., Al Dubai, A., Pitropakis, N., & Buchanan, W. J. (2024, July). VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography. Presented at 2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP), Sousse, Tunisia

In this digital era, ensuring the security of data transmission is critically important. Digital data, especially image data, needs to be secured against unauthorized access. In this regards, this paper presents a robust image encryption scheme named... Read More about VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography.

Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks (2024)
Presentation / Conference Contribution
Baird, I., Ghaleb, B., Wadhaj, I., Russell, G., & Buchanan, W. J. (2024, June). Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks. Presented at 4th International Conference on Robotics and Control Engineering, Edinburgh

This paper introduces an innovative strategy for countering Sybil and DODAG Information Solicitation (DIS) flood attacks within lightweight Internet of Things (IoT) networks. The proposed method combines a one-way hash chain with a Bloom filter, leve... Read More about Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks.

An Intelligent Digital Twin Model for Attack Detection in Zero-Touch 6G Networks (2024)
Presentation / Conference Contribution
Bolat-Akça, B., Bozkaya-Aras, E., Canberk, B., Buchanan, B., & Schmid, S. (2024, June). An Intelligent Digital Twin Model for Attack Detection in Zero-Touch 6G Networks. Presented at 2024 IEEE International Conference on Communications Workshops (ICC Workshops), Denver, CO, USA

The rapid adoption of Internet of Things (IoT) services and the increasingly stringent dependability and performance requirements are transforming next-generation wireless network management towards zero-touch 6G networks. Zero-touch management is al... Read More about An Intelligent Digital Twin Model for Attack Detection in Zero-Touch 6G Networks.

Transforming EU Governance: The Digital Integration Through EBSI and GLASS (2024)
Presentation / Conference Contribution
Kasimatis, D., Buchanan, W. J., Abubakar, M., Lo, O., Chrysoulas, C., Pitropakis, N., Papadopoulos, P., Sayeed, S., & Sel, M. (2024, June). Transforming EU Governance: The Digital Integration Through EBSI and GLASS. Presented at 39th IFIP International Conference, Edinburgh, UK

Traditionally, government systems managed citizen identities through disconnected data systems, using simple identifiers and paper-based processes, limiting digital trust and requiring citizens to request identity verification documents. The digital... Read More about Transforming EU Governance: The Digital Integration Through EBSI and GLASS.

Enhancing Supercapacitor Electrochemical Performance with 3D Printed Cellular PEEK/MWCNT Electrodes Coated with PEDOT: PSS (2024)
Journal Article
Chandran, A. C. S., Schneider, J., Nair, R., Buchanan, B., Gadegaard, N., Hogg, R., Kumar, S., & Manjakkal, L. (in press). Enhancing Supercapacitor Electrochemical Performance with 3D Printed Cellular PEEK/MWCNT Electrodes Coated with PEDOT: PSS. ACS Omega, 9(31), 33998-34007. https://doi.org/10.1021/acsomega.4c04576

In this study, we examine the electrochemical performance of supercapacitor (SC) electrodes made from 3D-printed nanocomposites. These composites consist of multiwalled carbon nanotubes (MWCNTs) and polyether ether ketone (PEEK), coated with poly­(3,... Read More about Enhancing Supercapacitor Electrochemical Performance with 3D Printed Cellular PEEK/MWCNT Electrodes Coated with PEDOT: PSS.

Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology (2024)
Journal Article
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N., Ghaleb, B., Ullah, A., Khan, M. A., & Buchanan, W. J. (2024). Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology. IEEE Transactions on Consumer Electronics, 70(4), 7087 - 7101. https://doi.org/10.1109/tce.2024.3415411

The rapid advancement in consumer technology has led to an exponential increase in the connected devices, resulting in an enormous and continuous flow of data, particularly the image data. This data needs to be processed, managed, and secured efficie... Read More about Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology.