Skip to main content

Research Repository

Advanced Search

Dr Isam Wadhaj's Outputs (3)

A Comparative Study of VANET Routing Protocols for Safety Applications (2023)
Presentation / Conference Contribution
Coyle, K., Thomson, C., Wadhaj, I., & Ghaleb, B. (2023, November). A Comparative Study of VANET Routing Protocols for Safety Applications. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh

The rapid advancement of vehicular communication technologies has led to the emergence of Vehicular AdHoc Networks (VANETs), which hold immense potential for improving road safety and traffic efficiency. VANETs enable vehicles to communicate with eac... Read More about A Comparative Study of VANET Routing Protocols for Safety Applications.

An Overview of Blockchain-Based IoT Architectures and Designs (2023)
Presentation / Conference Contribution
Abubakar, M., Ali, H., Ghaleb, B., Wadhaj, I., & Buchanan, W. J. (2022, September). An Overview of Blockchain-Based IoT Architectures and Designs. Presented at International Conference on Emerging Technologies and Intelligent Systems, Online

In recent years there has been an increased interest in the internet of things and blockchain in both industry and academia. The blockchain is quickly becoming an important technology that will fundamentally alter the method in which people exchange... Read More about An Overview of Blockchain-Based IoT Architectures and Designs.

The Mobile Attacks Under Internet of Things Networks (2023)
Presentation / Conference Contribution
Kean, C., Ghaleb, B., Mcclelland, B., Ahmad, J., Wadhaj, I., & Thomson, C. (2022, September). The Mobile Attacks Under Internet of Things Networks. Presented at International Conference on Emerging Technologies and Intelligent Systems, Online

Since the introduction of the Routing Protocol for Low Power and Lossy Networks (RPL), its security aspects have been the focus of the scientific community who reported several security flaws that left the protocol vulnerable for several attacks. In... Read More about The Mobile Attacks Under Internet of Things Networks.