Skip to main content

Research Repository

Advanced Search

Outputs (680)

BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. (2017)
Book Chapter
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2017). BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. In M. Grzenda, J. Furtak, J. Legierski, & A. I. Awad (Eds.), Advances in Networking Systems

The IEEE 802.15.4 standard supports both physical and Media Access Con-trol (MAC) layers of low rate Wireless Sensor Network (WSNs). However, this stand-ard considers only the ideal linear power consumption, omitting the fact that the diffu-sion prin... Read More about BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC..

Applied web traffic analysis for numerical encoding of SQL Injection attack features (2016)
Presentation / Conference Contribution
Uwagbole, S., Buchanan, W., & Fan, L. (2016, July). Applied web traffic analysis for numerical encoding of SQL Injection attack features. Presented at 15th European Conference on Cyber Warfare and Security ECCWS-2016

SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web form’s input and query strings used in web requests with malicious intent... Read More about Applied web traffic analysis for numerical encoding of SQL Injection attack features.

Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things (2016)
Presentation / Conference Contribution
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016, June). Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things. Presented at 5th IEEE International Conference on Mobile Services, San Francisco, USA

Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirements of low-power and low-processing devices. To address this issue, we com... Read More about Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.

A new dynamic weight clustering algorithm for wireless sensor networks (2017)
Presentation / Conference Contribution
Essa, A., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2016, May). A new dynamic weight clustering algorithm for wireless sensor networks. Presented at 1st EAI International Conference on Smart Grid Inspired Future Technologies (SmartGift 2016)

Since sensor nodes have limited energy resources, prolonging network lifetime and improving scalability are essential elements in energy-efficient Wireless Sensor Networks (WSNs). Most existing approaches consider the residual energy of a single node... Read More about A new dynamic weight clustering algorithm for wireless sensor networks.

Numerical encoding to tame SQL injection attacks (2016)
Presentation / Conference Contribution
Uwagbole, S., Buchanan, W. J., & Fan, L. (2016, April). Numerical encoding to tame SQL injection attacks. Presented at 2ND IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT)

Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases. Intruders becoming smarter in obfuscating web requests to evade detection... Read More about Numerical encoding to tame SQL injection attacks.

A new distributed MIKEY mode to secure e-health applications. (2016)
Presentation / Conference Contribution
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2016, April). A new distributed MIKEY mode to secure e-health applications. Presented at International Conference on Internet of Things and Big Data (IoTBD 2016)

Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing standard based protocols. Among these protocols, MIKEY (Multimedia Interne... Read More about A new distributed MIKEY mode to secure e-health applications..

An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation (2015)
Journal Article
Fang, D., Liu, X., Romdhani, I., Jamshidi, P., & Pahl, C. (2016). An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation. Future Generation Computer Systems, 56, 11-26. https://doi.or

Cloud computing enables a revolutionary paradigm of consuming ICT services. However, due to the inadequately described service information, users often feel confused while trying to find the optimal services. Although some approaches are proposed to... Read More about An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation.

Evaluation of TFTP DDoS amplification attack (2015)
Journal Article
Sieklik, B., Macfarlane, R., & Buchanan, W. J. (2016). Evaluation of TFTP DDoS amplification attack. Computers and Security, 57, 67-92. https://doi.org/10.1016/j.cose.2015.09.006

Web threats are becoming a major issue for both governments and companies. Generally, web threats increased as much as 600% during last year (WebSense, 2013). This appears to be a significant issue, since many major businesses seem to provide these s... Read More about Evaluation of TFTP DDoS amplification attack.

Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things (2018)
Journal Article
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2018). Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things. International Journal of Sensor Networks, 26(4), 227. https://doi.org/10.1504/ijsnet.2018.0

E-health applications have emerged as a promising approach to provide unobtrusive and customizable support to elderly and frail people based on their situation and circumstances. However, due to limited resources available in such systems and data pr... Read More about Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things.

A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK) (2015)
Presentation / Conference Contribution
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015). A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and

It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and mission-critical sensing tasks, securing multicast applications is therefo... Read More about A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK).

A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things (2015)
Presentation / Conference Contribution
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015, October). A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquit

Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However, a regular update process causes extra signaling overhead and drains the n... Read More about A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things.

Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks (2015)
Presentation / Conference Contribution
Wadhaj, I., Kristof, I., Romdhani, I., & Al-Dubai, A. (2015, October). Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks. Presented at 2015 IEEE International Conference on Computer and Information Technology

Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how a routing protocol for low-power and lossy-networks such as (RPL) would per... Read More about Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks.

Secret shares to protect health records in Cloud-based infrastructures (2016)
Presentation / Conference Contribution
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016). Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Servi

Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This paper outlines a novel Cloud-based architecture (SECRET) which supports keyl... Read More about Secret shares to protect health records in Cloud-based infrastructures.

Sticky-Policy enabled authenticated OOXML for Health Care (2015)
Presentation / Conference Contribution
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2015). Sticky-Policy enabled authenticated OOXML for Health Care. In Proceedings of BCS Health Informatics Scotland 2015 Conference. https://doi.org/10.14236/ewic/HIS2015.3

This paper proposes a secure medical document sharing construction, which addresses confidentiality and authenticity concerns related to cloud-based data protection issues. The paper extends the popular Office Open XML (OOXML) document format with eX... Read More about Sticky-Policy enabled authenticated OOXML for Health Care.

A load-balancing cluster based protocol for Wireless Sensor Networks. (2015)
Presentation / Conference Contribution
Eshaftri, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015, September). A load-balancing cluster based protocol for Wireless Sensor Networks. Paper presented at 4th International Conference on Wireless Sensor Networks (WSN'15)

RESCUE: Resilient Secret Sharing Cloud-based Architecture. (2015)
Presentation / Conference Contribution
Ukwandu, E., Buchanan, W. J., Fan, L., Russell, G., & Lo, O. (2015, August). RESCUE: Resilient Secret Sharing Cloud-based Architecture. Presented at TrustCom 2015 The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Commu

This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without user’s intervention; and break-glass data recovery, with in-built failover pro... Read More about RESCUE: Resilient Secret Sharing Cloud-based Architecture..

Ashley Madison breach reveals the rise of the moralist hacker (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). Ashley Madison breach reveals the rise of the moralist hacker

There’s value in more than just credit card data, as Avid Life Media (ALM), parent company of the extramarital affair website Ashley Madison, has found out after being raided for millions of their customer’s details. All sorts of information that isn... Read More about Ashley Madison breach reveals the rise of the moralist hacker.

Apple and Starbucks could have avoided being hacked if they'd taken this simple step (2015)
Newspaper / Magazine
Buchanan, W. J. (2015). Apple and Starbucks could have avoided being hacked if they'd taken this simple step

Apple and Starbucks are two of the world’s most trusted companies, but their reputations were recently tarnished thanks to some novice cybersecurity mistakes. Both setup systems that could have allowed hackers to break into customers' accounts by rep... Read More about Apple and Starbucks could have avoided being hacked if they'd taken this simple step.

Vulnerability analysis. (2015)
Presentation / Conference Contribution
Buchanan, W. J. (2015, May). Vulnerability analysis. Presented at Advanced Threat Protection

The current generation of threats against enterprise networks are more targeted, more persistent and more sophisticated than ever. Sony, eBay and JP Morgan are among the biggest names to fall victim in the last 12 months. The result is that massive a... Read More about Vulnerability analysis..