Skip to main content

Research Repository

Advanced Search

Addressing the DAO Insider Attack in RPL’s Internet of Things Networks (2018)
Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Qasem, M., Romdhani, I., & Mackenzie, L. (2019). Addressing the DAO Insider Attack in RPL’s Internet of Things Networks. IEEE Communications Letters, 23(1), 68-71. https://doi.org/10.1109/LCOMM.2018.2878151

In RPL routing protocol, the DAO (Destination Advertisement Object) control messages are announced by the child nodes to their parents to build downward routes. A malicious insider node can exploit this feature to send fake DAOs to its parents period... Read More about Addressing the DAO Insider Attack in RPL’s Internet of Things Networks.

A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT (2018)
Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Romdhani, I., Nasser, Y., & Boukerche, A. (2018). A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT. IEEE Internet of Things Journal, 5(6), 12. https://doi.org/10.1109/JIOT.2018.2862364

In this paper, we introduce Drizzle, a new algorithm for maintaining routing information in the Low-power and Lossy Networks (LLNs). The aim is to address the limitations of the currently standardized routing maintenance (i.e. Trickle algorithm) in s... Read More about A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT.

Blockchain and Git repositories for sticky policies protected OOXML. (2017)
Presentation / Conference
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2017, November). Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017

The paper discuss possible cloud-based Information Rights Management (IRM) model extension with enhanced accountability for both a sticky policy and an attached data. This work compliments research on secure data sharing with Office Open XML (OOX... Read More about Blockchain and Git repositories for sticky policies protected OOXML..

Sticky policies approach within cloud computing (2017)
Journal Article
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2017). Sticky policies approach within cloud computing. Computers and Security, 70, 366-375. https://doi.org/10.1016/j.cose.2017.07.005

This paper discusses a secure document sharing approach, which addresses confidentiality, integrity and authenticity concerns related to cloud-based data sharing. This research is focused on a secure construct that would integrate with other cloud re... Read More about Sticky policies approach within cloud computing.

A new enhanced RPL based routing for Internet of Things (2017)
Conference Proceeding
Ghaleb, B., Al-Dubai, A., Ekonomou, E., & Wadhaj, I. (2017). A new enhanced RPL based routing for Internet of Things. In 2017 IEEE International Conference on Communications (1-6). https://doi.org/10.1109/ICCW.2017.7962723

The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently standardized for routing in the constrained Internet of Things networks. Unfortunately, the RPL storing mode has been found restricted by storage limitations in the ro... Read More about A new enhanced RPL based routing for Internet of Things.

Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things (2016)
Conference Proceeding
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Paechter, B., & Qasem, M. (2016). Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things. In Wireless Communications and Networking Conference (WCNC), 2016 IEEE (1-6). https://doi.org/10.1109/WCNC.2016.7564654

Constrained Low-power and Lossy networks (LLNs) represent the building block for the ever-growing Internet of Things (IoT) that deploy the Routing Protocol for Low Power and Lossy networks (RPL) as a key routing standard. RPL, along with other routin... Read More about Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things.

Sticky policy enabled authenticated OOXML (2016)
Conference Proceeding
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2016). Sticky policy enabled authenticated OOXML. In Conference Proceedings of the IEEE Technically Sponsored SAI Computing Conference 2016. https://doi.org/10.1109/SAI.2016.7556117

This paper proposes a secure document sharing construction, which addresses confidentiality and authenticity concerns related to cloud-based data sharing. The goal of this research is to find an efficient way to share data in the cloud across various... Read More about Sticky policy enabled authenticated OOXML.

E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks (2015)
Conference Proceeding
Ghaleb, B., Al-Dubai, A., & Ekonomou, E. (2015). E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.168

Routing Protocol for Low Power and Lossy networks (RPL) is the de-facto standard for routing in resource-constrained low-power and lossy networks (LLNs) which represent the building block for the ever-growing Internet of Things (IoT). RPL along with... Read More about E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks.

Cloud-based identity and identity meta-data: secure and control own data in globalization era. (2014)
Journal Article
Spyra, G., Buchanan, W. J., Cruickshank, P., & Ekonomou, E. (2014). Cloud-based identity and identity meta-data: secure and control own data in globalization era. International Journal of Reliable and Quality E-Healthcare, 3, https://doi.org/10.4018/ijrqeh.2014010105

This paper proposes a new identity, and its underlying meta-data, model. The approach enables secure spanning of identity meta-data across many boundaries such as health-care, financial and educational institutions, including all others that store an... Read More about Cloud-based identity and identity meta-data: secure and control own data in globalization era..

Cloud4Health. (2012)
Presentation / Conference
Buchanan, W. J., Fan, L., Ekonomou, E., & Lo, O. (2012, May). Cloud4Health. Paper presented at Symposium on the Future of e-Health

The cloud4health platform focuses on creating a next generation infrastructure which aims to integrate assisted living with primary and secondary health care, in order to reduce patient risks. This presentation outlines how it integrates assisted liv... Read More about Cloud4Health..

Integrating assisted living with primary and secondary health care. (2012)
Presentation / Conference
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., Uthmani, O., & Thuemmler, C. (2012, May). Integrating assisted living with primary and secondary health care. Paper presented at Data Handling in Health and Social Care: Striking the balance between confidentiality, security and information sharing

This presentation outlines the Cloud4Health platform.

An Integrated Cloud-based Healthcare Infrastructure. (2011)
Conference Proceeding
Ekonomou, E., Fan, L., Buchanan, W. J., & Thuemmler, C. (2011). An Integrated Cloud-based Healthcare Infrastructure. In 2011 IEEE Third International Conference on Cloud Computing Technology and Science (CloudCom) (532-536). https://doi.org/10.1109/CloudCom.2011.80

We present a cloud-based healthcare system that integrates a formal care system (DACAR) with an informal care system (Microsoft HealthVault). The system provides high levels of security and privacy within a cloud environment, enabling sharing of both... Read More about An Integrated Cloud-based Healthcare Infrastructure..

Formal security policy implementations in network firewalls. (2011)
Journal Article
Macfarlane, R., Buchanan, W. J., Ekonomou, E., Uthmani, O., Fan, L., & Lo, O. (2012). Formal security policy implementations in network firewalls. Computers and Security, 31(2), 253-270. https://doi.org/10.1016/j.cose.2011.10.003

Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific policies, or configurations, written by network system administrators. Ther... Read More about Formal security policy implementations in network firewalls..

Cloud-based e-Health System. (2011)
Presentation / Conference
Buchanan, W. J., Fan, L., Thuemmler, C., Lo, O., & Ekonomou, E. (2011, September). Cloud-based e-Health System. Paper presented at BCS Health Informatics

This paper presents the future of health care system, which uses the newly developed security infrastructure.

Cloud-based digital forensics evaluation test (D-FET) platform. (2011)
Presentation / Conference
Buchanan, W. J., Macfarlane, R., Flandrin, F., Graves, J., Fan, L., Ekonomou, E., …Ludwiniak, R. (2011, June). Cloud-based digital forensics evaluation test (D-FET) platform. Paper presented at Cyberforensics 2011

This paper outlines the specification of the Cloud-based DFET platform which is used to evaluate the performance of digital forensics tools, which aim to detect the presence of trails of evidence, such as for the presence of illicit images and determ... Read More about Cloud-based digital forensics evaluation test (D-FET) platform..