Skip to main content

Research Repository

Advanced Search

Outputs (41)

Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System (2018)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., Russell, G., & Maneru-Marin, I. (2018, August). Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System. Presented at The 4th International Conference on Technology Trends, Babahoyo, Ecuador

Critical infrastructures such as nuclear plants or water supply systems are mainly managed through electronic control systems. Such systems comprise of a number of elements, such as programmable logic controllers (PLC), networking devices, and actua... Read More about Implementation and Detection of Novel Attacks to the PLC Memory on a Clean Water Supply System.

A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system (2018)
Presentation / Conference Contribution
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2018, June). A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. Presented at Cyber Security 2018: 2018 International Conference on Cyber Security and Protection of Digital Services, Glasgow, United Kingdom

Industrial Control Systems are part of our daily life in industries such as transportation, water, gas, oil, smart cities, and telecommunications. Technological development over time have improved their components including operating system platforms... Read More about A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system.

Cross-Layer Multipath Multichannel MAC protocol for MANETs (2018)
Presentation / Conference Contribution
Mirza, N., Taylor, H., Abdelshafy, M., King, P., Romdhani, I., & Alghamdi, A. (2018, June). Cross-Layer Multipath Multichannel MAC protocol for MANETs. Presented at The International Symposium on Networks, Computers and Communications (ISNCC), Rome, Italy

Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure is detected. However, depending on a stale route to recover from a broken li... Read More about Cross-Layer Multipath Multichannel MAC protocol for MANETs.

MOSAIC: Simultaneous Localization and Environment Mapping using mmWave without a-priori Knowledge (2018)
Journal Article
Yassin, A., Nasser, Y., Al-Dubai, A., & Awad, M. (2018). MOSAIC: Simultaneous Localization and Environment Mapping using mmWave without a-priori Knowledge. IEEE Access, 6, 68932-68947. https://doi.org/10.1109/access.2018.2879436

Simultaneous Localization and environment mapping (SLAM) is the core to robotic mapping and navigation as it constructs simultaneously the unknown environment and localizes the agent within. However, in millimeter wave (mmWave) research, SLAM is stil... Read More about MOSAIC: Simultaneous Localization and Environment Mapping using mmWave without a-priori Knowledge.

Addressing the DAO Insider Attack in RPL’s Internet of Things Networks (2018)
Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Qasem, M., Romdhani, I., & Mackenzie, L. (2019). Addressing the DAO Insider Attack in RPL’s Internet of Things Networks. IEEE Communications Letters, 23(1), 68-71. https://doi.org/10.1109/LCOMM.2018.2878151

In RPL routing protocol, the DAO (Destination Advertisement Object) control messages are announced by the child nodes to their parents to build downward routes. A malicious insider node can exploit this feature to send fake DAOs to its parents period... Read More about Addressing the DAO Insider Attack in RPL’s Internet of Things Networks.

Interference graphs to monitor and control schedules in low-power WPAN (2018)
Journal Article
van der Lee, T., Liotta, A., & Exarchakos, G. (2019). Interference graphs to monitor and control schedules in low-power WPAN. Future Generation Computer Systems, 93, 111-120. https://doi.org/10.1016/j.future.2018.10.014

Highlights
• This study presents the complete and slotted interference graph model.
• The service uses the complete interference graph to evaluate the network.
• Slotted interference graphs are used to reschedule problematic connections.
• Rea... Read More about Interference graphs to monitor and control schedules in low-power WPAN.

A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-power and Lossy Networks: A Focus on Core Operations (2018)
Journal Article
Ghaleb, B., Al-Dubai, A. Y., Ekonomou, E., Alsarhan, A., Nasser, Y., Mackenzie, L. M., & Boukerche, A. (2019). A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-power and Lossy Networks: A Focus on Core Operations. Communications Surveys and Tutorials, IEEE Communications Society, 21(2), 1607-1635. https://doi.org/10.1109/COMST.2018.2874356

Driven by the special requirements of the Low-power and Lossy Networks (LLNs), the IPv6 Routing Protocol for LLNs (RPL) was standardized by the IETF some six years ago to tackle the routing issue in such networks. Since its introduction, however, num... Read More about A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-power and Lossy Networks: A Focus on Core Operations.

Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings (2018)
Presentation / Conference Contribution
(2017, December). Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings. Presented at CollaborateCom 2017, Edinburgh, UK

This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2017, held in Edinburgh, UK, in December 2017. The 65 papers presente... Read More about Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings.

Cross-modality interactive attention network for multispectral pedestrian detection (2018)
Journal Article
Zhang, L., Liu, Z., Zhang, S., Yang, X., Qiao, H., Huang, K., & Hussain, A. (2019). Cross-modality interactive attention network for multispectral pedestrian detection. Information Fusion, 50, 20-29. https://doi.org/10.1016/j.inffus.2018.09.015

Multispectral pedestrian detection is an emerging solution with great promise in many around-the-clock applications, such as automotive driving and security surveillance. To exploit the complementary nature and remedy contradictory appearance between... Read More about Cross-modality interactive attention network for multispectral pedestrian detection.

Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things (2018)
Presentation / Conference Contribution
Semedo, F., Moradpoor, N., & Rafiq, M. (2018, September). Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. Presented at 11th International Conference On Security Of Information and Networks, Cardiff, United Kingdom

The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Positioning devices (GPS) and Local Area Network (LAN) interfaces. Security is by f... Read More about Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things.

A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT (2018)
Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Romdhani, I., Nasser, Y., & Boukerche, A. (2018). A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT. IEEE Internet of Things Journal, 5(6), 12. https://doi.org/10.1109/JIOT.2018.2862364

In this paper, we introduce Drizzle, a new algorithm for maintaining routing information in the Low-power and Lossy Networks (LLNs). The aim is to address the limitations of the currently standardized routing maintenance (i.e. Trickle algorithm) in s... Read More about A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT.

An Enhanced Cyber Attack Attribution Framework (2018)
Presentation / Conference Contribution
Pitropakis, N., Panaousis, E., Giannakoulias, A., Kalpakis, G., Rodriguez, R. D., & Sarigiannidis, P. (2018, September). An Enhanced Cyber Attack Attribution Framework. Presented at International Conference on Trust and Privacy in Digital Business TrustBus 2018, Regensburg, Germany

Advanced Persistent Threats (APTs) are considered as the threats that are the most challenging to detect and defend against. As APTs use sophisticated attack methods, cyber situational awareness and especially cyber attack attribution are necessary f... Read More about An Enhanced Cyber Attack Attribution Framework.

Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network (2018)
Presentation / Conference Contribution
Asif, R., Haithem, M., & Buchanan, W. J. (2018, July). Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network. Presented at Advanced Photonics 2018 (BGPP, IPR, NP, NOMA, Sensors, Networks, SPPCom, SOF)

We report a high capacity Quantum-to-the-Home (QTTH) network in a spatialdivision-multiplexing (SDM) network utilizing 7-core multicore fiber (MCF). Aggregate secure key rates of 33.6 Mbit/s over 9.8 km of fiber are the actual state-of-the-art.

Performance Investigation of RPL Routing in Pipeline Monitoring WSNs (2018)
Presentation / Conference Contribution
Wadhaj, I., Gharebi, W., Al-Dubai, A., & Thomson, C. (2018, June). Performance Investigation of RPL Routing in Pipeline Monitoring WSNs. Presented at 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Exeter, United Kingdom

The adoption of WSN and IEEE 802.15.4 standard for the linear WSN networks were assumed. The interconnection of WSNs with the Internet is possible by assigning IPv6 addresses to low- power devices. The 6LoWPAN adaption layer enables the IPv6 addresse... Read More about Performance Investigation of RPL Routing in Pipeline Monitoring WSNs.

Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks (2018)
Presentation / Conference Contribution
Ali, A. E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2018, June). Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks. Presented at The 16th IEEE International Conference on Smart City (IEEE SmartCity-2018), Exeter

In Wireless Sensor Networks, clustering sensor nodes into disjoint groups is widely used to achieve load balance and increase network lifetime. In particular, traditional unequal clustering approaches where small clusters located close to the base st... Read More about Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks.

Scalable training of artificial neural networks with adaptive sparse connectivity inspired by network science (2018)
Journal Article
Mocanu, D. C., Mocanu, E., Stone, P., Nguyen, P. H., Gibescu, M., & Liotta, A. (2018). Scalable training of artificial neural networks with adaptive sparse connectivity inspired by network science. Nature Communications, 9(1), Article 2383. https://doi.org/10.1038/s41467-018-04316-3

Through the success of deep learning in various domains, artificial neural networks are currently among the most used artificial intelligence methods. Taking inspiration from the network properties of biological neural networks (e.g. sparsity, scale-... Read More about Scalable training of artificial neural networks with adaptive sparse connectivity inspired by network science.

Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures (2018)
Journal Article
Barrowclough, J. P., & Asif, R. (2018). Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. Security and Communication Networks, 2018, 1-20. https://doi.org/10.1155/2018/1681908

The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hypervisor’ that may be attacked and user data can be compromised or hacked. In... Read More about Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures.

An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0 (2018)
Journal Article
Pace, P., Aloi, G., Gravina, R., Caliciuri, G., Fortino, G., & Liotta, A. (2019). An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0. IEEE Transactions on Industrial Informatics, 15(1), 481-489. https://doi.org/10.1109/tii.2018.2843169

Edge computing paradigm has attracted many interests in the last few years as a valid alternative to the standard cloud-based approaches to reduce the interaction timing and the huge amount of data coming from Internet of Things (IoT) devices toward... Read More about An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0.

Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors (2018)
Journal Article
Lenka, R. K., Rath, A. K., Tan, Z., Sharma, S., Puthal, D., Simha, N. V. R., Prasad, M., Raja, R., & Tripathi, S. S. (2018). Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors. IEEE Access, 6, 30162-30173. https://doi.org/10.1109/ACCESS.2018.2842760

Wireless Sensors are an important component to develop the Internet of Things (IoT) Sensing infrastructure. There are enormous numbers of sensors connected with each other to form a network (well known as wireless sensor networks) to complete IoT Inf... Read More about Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors.