Lecturer of Cybersecurity, Encryption and Networks
Ghaleb, B., Al-Dubai, A. & Romdhani, I. (2017). Drizzle: Adaptive and Fair Route Maintenance Algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC), 1-6. doi:10.1109/ICC.2017.7996819. ISBN 978-1-4673-8999-0
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopte...
Romdhani, I., Nabil, D., Medjek, F. & Tandjaoui, D. (in press). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In Proceedings of the Thirteenth International Conference on Wireless and Mobile CommunicationsISBN na
The vulnerability of IoT networks makes channel
access security a serious problem. The IEEE 802.15.4 MAC
(Media Access Control) layer faces the risk of attacks from
Asif, R. & Buchanan, W. J. (2017). Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)ISBN 978-1-5090-5880-8
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...
Carnegie Trust for the Universities of Scotland
As professionalism within surfing has attracted increasing sponsorship money, conditioning and decreased injury risk is of a high priority to the individual surfer. The project will endeavour to look...
Engineering and Physical Sciences Research Council
This project extends the e-Health Cloud-based Platform, and integrates with assisted living. The project integrates Edinburgh Napier University, Microsoft and HoIP, and has created a novel governance ...
The Internet of Things (IoT), a network of physical objects that can communicate, sense and act in the world, is rapidly expanding and is expected to account for nine billion of inter-connected device...
13 December 2016
Professor Hazel Hall served as a judge at the Edinburgh heat of FameLab 2017, held on Thursday 8th December 2016 at Heriot Watt University.
FameLab is a science c...
22 November 2017
19 May 2016
19 May 2016
Kate Sang and James Richards, Heriot-Watt University
With changes to the organisation of work, governments are giving increasing attention to the extent to which paid ...
Lecturer in Cybersecurity and Networks
Reader in Marine Sciences / Co-Director of Research, St Abbs Marine Station
Director of Sustainable Construction
Romdhani, I., Faiza, M., Tandjaoui, D. & Djedjig, N. (in press). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In International Symposium on Security, Privacy and Trust in Internet of Things (SPTIoT 2017ISBN n/a
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Faiza, M., Tandjaoui, D., Romdhani, I. & Nabil, D. (in press). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)ISBN unknown
Successful deployment of Low power and Lossy
Networks (LLNs) requires self-organising, self-configuring, security,
and mobility support. However, these characteristics can be
Uwagbole, S. O., Buchanan, W. J. & Fan, L. (in press). Applied Machine Learning Predictive Analytics to SQL Injection Attack Detection and Prevention. In Proceedings
The back-end database is pivotal to the storage of the massive size of big data Internet exchanges stemming from cloud-hosted web applications to Internet of Things (IoT) smar...
Romdhani, I., Djedjig, N., Medjek, F. & Tandjaoui, D. (in press). New Trust Metric for the RPL Routing Protocol. In Proceedings of ICICS 2017
Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. ...
Buwert, P. (2017). Shepard Fairey’s inauguration posters may define political art in Trump era
The American street artist Shepard Fairey created a poster for Barack Obama’s presidential election campaign. It was 2008 and the simple red, beige and blue stencilled image o...
Uwagbole, S. O., Buchanan, W. J. & Fan, L. (in press). Numerical Encoding to Tame SQL Injection Attacks
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations' databases....
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B. & Gharibi, W. (2016). A new efficient objective function for routing in Internet of Things paradigm. In 2016 IEEE Conference on Standards for Communications and Networking (CSCN),doi:10.1109/cscn.2016.7785168. ISBN 978-1-5090-3862-6
Low Power and Lossy Networks (LLNs) have a crucial role in the Internet of Things (IoT) paradigm. For the IPv6 Routing Protocol for LLNs (RPL), two objective functions (OF) ha...
Grigoriadis, N., Bakirtzis, C., Politis, C., Danas, K. & Thuemmler, C. (2016). Health 4.0: The Case of Multiple Sclerosis. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), 100-104. doi:10.1109/HealthCom.2016.7749437. ISBN 978-1-5090-3370-6
Multiple sclerosis is a chronic and variable disease in matters of symptoms, clinical course and outcome. The ultimate goal of currently used drugs and therapeutic strategies ...
Ghaleb, B., Al-Dubai, A., Ekonomou, E. & Paechter, B. (2016). Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things. In Wireless Communications and Networking Conference (WCNC), 2016 IEEE, 1-6. doi:10.1109/WCNC.2016.7564654. ISBN 978-1-4673-9814-5
Constrained Low-power and Lossy networks (LLNs) represent the building block for the ever-growing Internet of Things (IoT) that deploy the Routing Protocol for Low Power and L...
Uwagbole, S., Buchanan, W. J. & Fan, L. (2016). Numerical encoding to tame SQL injection attacks. In 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS),doi:10.1109/NOMS.2016.7502997. ISBN 978-1-5090-0223-8
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases....
Abdmeziem, M. R., Tandjaoui, D. & Romdhani, I. (2016). A new distributed MIKEY mode to secure e-health applications. In Chang, V., Méndez Muñoz, V., Walters, R., Wills, G. & Ramachandran, M. (Eds.). Proceedings of the International Conference on Internet of Things and Big Data, 88-95. doi:10.5220/0005945300880095. ISBN 978-989-758-183-0
Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing...
Wireless sensor networks (WSNs) and Internet of things are among the top potential new technologies that dramatically alter the world and the way we live and work. Indeed, in recent decades, the need ...
Mobile ad-hoc networking (MANET) technology has been a major avenue for many wireless and mobile networke...
Ambient-Intelligent Inhabited Environment using Cognitive-Internet of Everything
21 June 2017
21 June 2017
The prevalence of dementia in the UK is increasing with over 800,000 people currently affected. Of this number in excess of 40,000 are aged under 65 years suggesting that a si...