Skip to main content

Research Repository

Advanced Search

Outputs (23)

Resolving the Decreased Rank Attack in RPL’s IoT Networks (2023)
Conference Proceeding
Ghaleb, B., Al-Duba, A., Hussain, A., Romdhani, I., & Jaroucheh, Z. (2023). Resolving the Decreased Rank Attack in RPL’s IoT Networks. In 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT) (65-68). https://doi.org/10.1109/DCOSS-IoT58021.2023.00018

The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core... Read More about Resolving the Decreased Rank Attack in RPL’s IoT Networks.

Crypto Assets Custody: Taxonomy, Components, and Open Challenges (2023)
Conference Proceeding
Jaroucheh, Z., & Ghaleb, B. (2023). Crypto Assets Custody: Taxonomy, Components, and Open Challenges. . https://doi.org/10.1109/icbc56567.2023.10174959

Custody plays a fundamental role for organizations and individuals seeking to access crypto assets (e.g., cryptocurrencies) and decentralized finance (DeFi) applications. Custodians store private keys and approve and sign transactions. Crypto asset t... Read More about Crypto Assets Custody: Taxonomy, Components, and Open Challenges.

A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract (2022)
Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Liu, X. (2022). A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract. In 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH). https://doi.org/10.1109/smarttech54121.2022.00032

Two-factor authentication (2FA) is commonly used in Internet of Things (IoT) authentication to provide multi-layer protection. Tokens, often known as One-Time Passwords (OTP), are used to offer additional information. While this technique provides fl... Read More about A Lightweight and User-centric Two-factor Authentication Mechanism for IoT Based on Blockchain and Smart Contract.

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers (2022)
Conference Proceeding
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2022). Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. In IEEE SINCONF: 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699366

Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the... Read More about Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.

Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates (2022)
Conference Proceeding
Abubakar, M., McCarron, P., Jaroucheh, Z., Al Dubai, A., & Buchanan, B. (2022). Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/SIN54109.2021.9699221

The COVID-19 pandemic has recently emerged as a worldwide health emergency that necessitates coordinated international measures. To contain the virus's spread, governments and health organisations raced to develop vaccines that would lower Covid-19 m... Read More about Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates.

Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles (2021)
Conference Proceeding
Cutajar, O., Moradpoor, N., & Jaroucheh, Z. (2021). Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/SIN54109.2021.9699326

In a perfect world, coordination and cooperation across distributed autonomous systems would be a trivial task. However, incomplete information, malicious actors and real-world conditions can provide challenges which bring the trust-worthiness of par... Read More about Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles.

Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems (2021)
Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. (2021). Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. In 2021 5th Cyber Security in Networking Conference (CSNet). https://doi.org/10.1109/csnet52717.2021.9614646

The Session Initiation Protocol (SIP) is the principal signalling protocol in Voice over IP (VoIP) systems, responsible for initialising, terminating, and maintaining sessions amongst call parties. However, the problem with the SIP protocol is that i... Read More about Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems.

A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data (2021)
Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. J. (2021). A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data. In 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS). https://doi.org/10.1109/coins51742.2021.9524172

Recent years have seen an increase in medical big data, which can be attributed to a paradigm shift experienced in medical data sharing induced by the growth of medical technology and the Internet of Things. The evidence of this potential has been pr... Read More about A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data.

Blockchain-based identity and authentication scheme for MQTT protocol (2021)
Conference Proceeding
Abdelrazig Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Liu, X. (2021). Blockchain-based identity and authentication scheme for MQTT protocol. In ICBCT '21: 2021 The 3rd International Conference on Blockchain Technology (73-81). https://doi.org/10.1145/3460537.3460549

The publish and subscribe messaging model has proven itself as a dominant messaging paradigm for IoT systems. An example of such is the commonly used Message Queuing Telemetry Transport (MQTT) protocol. However, the security concerns with this protoc... Read More about Blockchain-based identity and authentication scheme for MQTT protocol.

Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution (2021)
Conference Proceeding
Jaroucheh, Z., & Álvarez, I. A. (2021). Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution. In 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). https://doi.org/10.1109/icbc51069.2021.9461144

Secrets such as passwords, encryption keys, and certificates are used to assist in protecting access to resources such as computing devices, customer data and other information. Unauthorised access to resources can cause significant disruption and/or... Read More about Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution.

Programming Languages: A Usage-based Statistical Analysis and Visualization (2021)
Conference Proceeding
Orlowska, A., Chrysoulas, C., Jaroucheh, Z., & Liu, X. (2021). Programming Languages: A Usage-based Statistical Analysis and Visualization. In ICISS 2021: 2021 The 4th International Conference on Information Science and Systems (143-148). https://doi.org/10.1145/3459955.3460614

Understanding the popularity, and its trend, of programming languages can be important to anticipate which languages are best studied for future use, which are widely supported for use in enterprise projects, and investigate which skills are easiest... Read More about Programming Languages: A Usage-based Statistical Analysis and Visualization.

PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism (2020)
Conference Proceeding
Abubakar, M. A., Jaroucheh, Z., Al-Dubai, A., & Buchanan, B. (2020). PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism. In ICVISP 2020: Proceedings of the 2020 4th International Conference on Vision, Image and Signal Processing (1-8). https://doi.org/10.1145/3448823.3448875

The original consensus algorithm - Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ethereum, among many others. Nevertheless, the concept has received criticisms... Read More about PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism.

PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism (2020)
Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Buchanan, W. (2020). PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism. In ICVISP 2020: Proceedings of the 2020 4th International Conference on Vision, Image and Signal Processing. https://doi.org/10.1145/3448823.3448875

The original consensus algorithm-Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ethereum, among many others. Nevertheless, the concept has received criticisms o... Read More about PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism.

Trust-based Ecosystem to Combat Fake News (2020)
Conference Proceeding
Jaroucheh, Z., Alissa, M., & Buchanan, W. J. (2020). Trust-based Ecosystem to Combat Fake News. . https://doi.org/10.1109/icbc48266.2020.9169435

The growing spread of misinformation and dis-information has grave political, social, ethical, and privacy implications for society. Therefore, there is an ethical need to combat the flow of fake news. This paper attempts to resolves some of the aspe... Read More about Trust-based Ecosystem to Combat Fake News.

TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies (2020)
Conference Proceeding
Jaroucheh, Z., Alissa, M., Buchanan, W. J., & Liu, X. (2020). TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies. In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC 2020) (1215-1220)

The growing trend of sharing news/contents, through social media platforms and the World Wide Web has been seen to impact our perception of the truth, altering our views about politics, economics, relationships, needs and wants. This is because of th... Read More about TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies.

SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain (2020)
Conference Proceeding
Jaroucheh, Z., Ghaleb, B., & Buchanan, W. J. (2020). SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain. . https://doi.org/10.1109/icsa-c50368.2020.00034

The proof-of-work consensus protocol suffers from two main limitations: waste of energy and offering only probabilistic guarantees about the status of the blockchain. This paper introduces SklCoin, a new Byzantine consensus protocol and its correspon... Read More about SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain.

Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications (2011)
Conference Proceeding
Jaroucheh, Z., Liu, X., Smith, S., & Zhao, H. (2011). Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications. In 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (COMPSACW), (351-355). https://doi.org/10.1109/compsacw.2011.65

Protecting user's privacy is one of the main concerns for the deployment of pervasive computing systems in the real world. In pervasive environments, the user context information is naturally distributed among different spatial or logical domains. Ma... Read More about Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications.

Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications (2010)
Conference Proceeding
Jaroucheh, Z., Liu, X., & Smith, S. (2010). Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications. In Proceedings of IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technologies (WI-IAT 2010) (611-614). https://doi.org/10.1109/wi-iat.2010.25

Context-aware computing is widely accepted as a promising paradigm to enable seamless computing. Several middlewares and ontology-based models for describing context information have been developed in order to support context-aware applications. Howe... Read More about Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications.

Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes (2010)
Conference Proceeding
Jaroucheh, Z., Liu, X., & Smith, S. (2010). Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes. In Proceedings of The 8th IEEE International Conference on Web Services (ICWS’10) (219-226). https://doi.org/10.1109/icws.2010.16

Context-awareness and adaptability are important and desirable properties of service-based processes designed to provide personalized services. Most of the existing approaches focus on the adaptation at the process instance level [1] which involves e... Read More about Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes.

CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications (2010)
Conference Proceeding
Jaroucheh, Z., Liu, X., & Smith, S. (2010). CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications. In CICIS'10 Proceedings (209-216). https://doi.org/10.1109/cisis.2010.21

In a pervasive environment, it is essential for computing applications to be context-aware. However, one of the major challenges is the establishment of a generic and dynamic context model. Many different approaches to modeling the context exist, but... Read More about CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications.

A Perspective on Middleware-Oriented Context-Aware Pervasive Systems (2009)
Conference Proceeding
Jaroucheh, Z., Liu, X., & Smith, S. (2009). A Perspective on Middleware-Oriented Context-Aware Pervasive Systems. In Proceedings - International Computer Software and Applications Conference (249-254). https://doi.org/10.1109/compsac.2009.142

The evolving concepts of mobile computing, context-awareness, and ambient intelligence are increasingly influencing user's experience of services. Therefore, the goal of this paper is to provide an overview of recent developments and implementations... Read More about A Perspective on Middleware-Oriented Context-Aware Pervasive Systems.