Skip to main content

Research Repository

Advanced Search

Outputs (63)

A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-power and Lossy Networks: A Focus on Core Operations (2018)
Journal Article
Ghaleb, B., Al-Dubai, A. Y., Ekonomou, E., Alsarhan, A., Nasser, Y., Mackenzie, L. M., & Boukerche, A. (2019). A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-power and Lossy Networks: A Focus on Core Operations. Communications Surveys and Tutorials, IEEE Communications Society, 21(2), 1607-1635. https://doi.org/10.1109/COMST.2018.2874356

Driven by the special requirements of the Low-power and Lossy Networks (LLNs), the IPv6 Routing Protocol for LLNs (RPL) was standardized by the IETF some six years ago to tackle the routing issue in such networks. Since its introduction, however, num... Read More about A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-power and Lossy Networks: A Focus on Core Operations.

Method for identification of digital content (2018)
Patent
Buchanan, B., Lo, O., Penrose, P., Ramsay, B., & Macfarlane, R. (2018). Method for identification of digital content. World Intellectual Property Organization

Many areas oi investigation require searching through data that may be oi interest. One example oi data that may be involved in an investigation is copyrighted material that may be suspected of having been obtained or reproduced illegally by a third... Read More about Method for identification of digital content.

Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings (2018)
Presentation / Conference Contribution
(2017, December). Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings. Presented at CollaborateCom 2017, Edinburgh, UK

This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2017, held in Edinburgh, UK, in December 2017. The 65 papers presente... Read More about Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings.

Cross-modality interactive attention network for multispectral pedestrian detection (2018)
Journal Article
Zhang, L., Liu, Z., Zhang, S., Yang, X., Qiao, H., Huang, K., & Hussain, A. (2019). Cross-modality interactive attention network for multispectral pedestrian detection. Information Fusion, 50, 20-29. https://doi.org/10.1016/j.inffus.2018.09.015

Multispectral pedestrian detection is an emerging solution with great promise in many around-the-clock applications, such as automotive driving and security surveillance. To exploit the complementary nature and remedy contradictory appearance between... Read More about Cross-modality interactive attention network for multispectral pedestrian detection.

Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things (2018)
Presentation / Conference Contribution
Semedo, F., Moradpoor, N., & Rafiq, M. (2018, September). Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things. Presented at 11th International Conference On Security Of Information and Networks, Cardiff, United Kingdom

The Internet of Things (IoT) can be described as the ever-growing global network of objects with built-in sensing and communication interfaces such as sensors, Global Positioning devices (GPS) and Local Area Network (LAN) interfaces. Security is by f... Read More about Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things.

Privacy Parameter Variation using RAPPOR on a Malware Dataset (2018)
Presentation / Conference Contribution
Aaby, P., Mata De Acuña, J. J., Macfarlane, R., & Buchanan, W. J. (2018, August). Privacy Parameter Variation using RAPPOR on a Malware Dataset. Presented at 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA

Stricter data protection regulations and the poor application of privacy protection techniques have resulted in a requirement for data-driven companies to adopt new methods of analysing sensitive user data. The RAPPOR (Randomized Aggregatable Privacy... Read More about Privacy Parameter Variation using RAPPOR on a Malware Dataset.

Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device (2018)
Presentation / Conference Contribution
Lo, O., Buchanan, W. J., & Carson, D. (2018, August). Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. Presented at ACM Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany

Traditional cryptographic techniques have proven to work well on most modern computing devices but they are unsuitable for devices (e.g. IoT devices) where memory, power consumption or processing power is limited. Thus, there has been an increasing a... Read More about Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device.

GDPR and Cyber Security for Business Information Systems (2018)
Book
Gobeo, A., Fowler, C., & Buchanan, B. (2018). GDPR and Cyber Security for Business Information Systems. River Publishers

The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to protect the Rights and Freedoms of all the individuals i... Read More about GDPR and Cyber Security for Business Information Systems.

A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT (2018)
Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Romdhani, I., Nasser, Y., & Boukerche, A. (2018). A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT. IEEE Internet of Things Journal, 5(6), 12. https://doi.org/10.1109/JIOT.2018.2862364

In this paper, we introduce Drizzle, a new algorithm for maintaining routing information in the Low-power and Lossy Networks (LLNs). The aim is to address the limitations of the currently standardized routing maintenance (i.e. Trickle algorithm) in s... Read More about A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT.

A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment (2018)
Journal Article
Babar, M., Khan, F., Iqbal, W., Yahya, A., Arif, F., Tan, Z., & Chuma, J. (2018). A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment. IEEE Access, 6, 43088-43099

Smart societies have an increasing demand for quality-oriented services and infrastructure in an Industrial Internet of Things (IIoT) paradigm. Smart urbanization faces numerous challenges. Among them, secured energy Demand Side Management (DSM) is o... Read More about A Secured Data Management Scheme for Smart Societies in Industrial Internet of Things Environment.

Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network (2018)
Presentation / Conference Contribution
Asif, R., Haithem, M., & Buchanan, W. J. (2018, July). Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network. Presented at Advanced Photonics 2018 (BGPP, IPR, NP, NOMA, Sensors, Networks, SPPCom, SOF)

We report a high capacity Quantum-to-the-Home (QTTH) network in a spatialdivision-multiplexing (SDM) network utilizing 7-core multicore fiber (MCF). Aggregate secure key rates of 33.6 Mbit/s over 9.8 km of fiber are the actual state-of-the-art.

Performance Investigation of RPL Routing in Pipeline Monitoring WSNs (2018)
Presentation / Conference Contribution
Wadhaj, I., Gharebi, W., Al-Dubai, A., & Thomson, C. (2018, June). Performance Investigation of RPL Routing in Pipeline Monitoring WSNs. Presented at 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Exeter, United Kingdom

The adoption of WSN and IEEE 802.15.4 standard for the linear WSN networks were assumed. The interconnection of WSNs with the Internet is possible by assigning IPv6 addresses to low- power devices. The 6LoWPAN adaption layer enables the IPv6 addresse... Read More about Performance Investigation of RPL Routing in Pipeline Monitoring WSNs.

Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks (2018)
Presentation / Conference Contribution
Ali, A. E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2018, June). Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks. Presented at The 16th IEEE International Conference on Smart City (IEEE SmartCity-2018), Exeter

In Wireless Sensor Networks, clustering sensor nodes into disjoint groups is widely used to achieve load balance and increase network lifetime. In particular, traditional unequal clustering approaches where small clusters located close to the base st... Read More about Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks.

Scalable training of artificial neural networks with adaptive sparse connectivity inspired by network science (2018)
Journal Article
Mocanu, D. C., Mocanu, E., Stone, P., Nguyen, P. H., Gibescu, M., & Liotta, A. (2018). Scalable training of artificial neural networks with adaptive sparse connectivity inspired by network science. Nature Communications, 9(1), Article 2383. https://doi.org/10.1038/s41467-018-04316-3

Through the success of deep learning in various domains, artificial neural networks are currently among the most used artificial intelligence methods. Taking inspiration from the network properties of biological neural networks (e.g. sparsity, scale-... Read More about Scalable training of artificial neural networks with adaptive sparse connectivity inspired by network science.

Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures (2018)
Journal Article
Barrowclough, J. P., & Asif, R. (2018). Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. Security and Communication Networks, 2018, 1-20. https://doi.org/10.1155/2018/1681908

The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hypervisor’ that may be attacked and user data can be compromised or hacked. In... Read More about Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures.

An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0 (2018)
Journal Article
Pace, P., Aloi, G., Gravina, R., Caliciuri, G., Fortino, G., & Liotta, A. (2019). An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0. IEEE Transactions on Industrial Informatics, 15(1), 481-489. https://doi.org/10.1109/tii.2018.2843169

Edge computing paradigm has attracted many interests in the last few years as a valid alternative to the standard cloud-based approaches to reduce the interaction timing and the huge amount of data coming from Internet of Things (IoT) devices toward... Read More about An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0.

Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors (2018)
Journal Article
Lenka, R. K., Rath, A. K., Tan, Z., Sharma, S., Puthal, D., Simha, N. V. R., Prasad, M., Raja, R., & Tripathi, S. S. (2018). Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors. IEEE Access, 6, 30162-30173. https://doi.org/10.1109/ACCESS.2018.2842760

Wireless Sensors are an important component to develop the Internet of Things (IoT) Sensing infrastructure. There are enormous numbers of sensors connected with each other to form a network (well known as wireless sensor networks) to complete IoT Inf... Read More about Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors.

Applications of Blockchain Within Healthcare. (2018)
Journal Article
Bell, L., Buchanan, W. J., Cameron, J., & Lo, O. (2018). Applications of Blockchain Within Healthcare. Blockchain in Healthcare Today,

There are several areas of healthcare and well-being that could be enhanced using blockchain technologies. These include device tracking, clinical trials, pharmaceutical tracing, and health insurance. Within device tracking, hospitals can trace their... Read More about Applications of Blockchain Within Healthcare..

Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases (2018)
Presentation / Conference Contribution
Clavie, B., & Moradpoor, N. (2018, May). Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases. Poster presented at 10th ACM Conference on Web Science, Amsterdam

This article explores a perceived bias between two British reddit communities dedicated to discussing British politics.We analyse the popular sources favoured by each community and study semantic indicators that would be indicative of a bias. Althoug... Read More about Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases.

Detection of Algorithmically Generated Malicious Domain (2018)
Presentation / Conference Contribution
Agyepong, E., Buchanan, W., & Jones, K. (2018, May). Detection of Algorithmically Generated Malicious Domain. Presented at Computer Science & Information Technology

In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, D... Read More about Detection of Algorithmically Generated Malicious Domain.