Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.
Conference Proceeding
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016)
Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things
Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirem...
Numerical encoding to tame SQL injection attacks
Conference Proceeding
Uwagbole, S., Buchanan, W. J., & Fan, L. (2016)
Numerical encoding to tame SQL injection attacks. In 2016 IEEE/IFIP Network Operations and Management Symposium (NOMS),https://doi.org/10.1109/NOMS.2016.7502997
Recent years have seen an astronomical rise in SQL Injection Attacks (SQLIAs) used to compromise the confidentiality, authentication and integrity of organisations’ databases....
Migration of mobile agents in ad-hoc wireless networks.
Conference Proceeding
Migas, N., Buchanan, W. J., & McArtney, K. (2004)
Migration of mobile agents in ad-hoc wireless networks. In Proceeding of the 11th IEEE International Conference and Workshop on the Engineering of Computer-based systems, 530-535. https://doi.org/10.1109/ECBS.2004.1316743
This paper focuses on the design and development of a novel architecture called MARIAN, which utilises static agents, mobile agents, and also a hybrid approach, in order to pe...
Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems
Conference Proceeding
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2010)
Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In J. Demergis (Ed.), Proceedings of 9th European Conference on Information Warfare and Security. , (190-200
There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat...
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system
Conference Proceeding
Robles-Durazno, A., Moradpoor, N., McWhinnie, J., & Russell, G. (2018)
A supervised energy monitoring-based machine learning approach for anomaly detection in a clean water supply system. In Proceedings of the IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2018)https://doi.org/10.1109/CyberSecPODS.2018.8560683
Industrial Control Systems are part of our daily life in industries such as transportation, water, gas, oil, smart cities, and telecommunications. Technological development ov...
Ad-hoc routing metrics and applied weighting for QoS support
Conference Proceeding
Migas, N., & Buchanan, W. J. (2008)
Ad-hoc routing metrics and applied weighting for QoS support. In 22nd IEEE International Parallel & Distributed Processing Symposium. , (1-8). https://doi.org/10.1109/IPDPS.2008.4536496
In the vast majority of ad-hoc routing protocols, the hop-counting mechanisms for identifying the optimal route are dominant. However, this approach oversimplifies such a comp...
A new distributed MIKEY mode to secure e-health applications.
Conference Proceeding
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2016)
A new distributed MIKEY mode to secure e-health applications. In V. Chang, V. Méndez Muñoz, R. Walters, G. Wills, & M. Ramachandran (Eds.), Proceedings of the International Conference on Internet of Things and Big Data, (88-95). https://doi.org/10.5220/0005945300880095
Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing...
A new efficient distributed route discovery for wireless mobile ad hoc networks.
Conference Proceeding
Bani Khalaf, M., Al-Dubai, A., & Buchanan, W. J. (2012)
A new efficient distributed route discovery for wireless mobile ad hoc networks. In Wireless Telecommunications Symposium (WTS), 2012, (1-6). https://doi.org/10.1109/WTS.2012.6266129
High performance group communication, such as broadcast, requires matching efficient broadcast algorithms to effective route discovery approach. Broadcast communication in MAN...
A new enhanced RPL based routing for Internet of Things
Conference Proceeding
Ghaleb, B., Al-Dubai, A., Ekonomou, E., & Wadhaj, I. (2017)
A new enhanced RPL based routing for Internet of Things. In 2017 IEEE International Conference on Communications. , (1-6). https://doi.org/10.1109/ICCW.2017.7962723
The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently standardized for routing in the constrained Internet of Things networks. Unfortunately, the ...
DACAR platform for eHealth services cloud.
Conference Proceeding
Fan, L., Buchanan, W. J., Thuemmler, C., Lo, O., Khedim, A. S., Uthmani, O., …Bell, D. (2011)
DACAR platform for eHealth services cloud. https://doi.org/10.1109/CLOUD.2011.31
The use of digital technologies in providing health care services is collectively known as eHealth. Considerable progress has been made in the development of eHealth services,...