Research explorer tool

7 results

Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT

Conference Proceeding
Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (in press)
Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT
Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, continuous observations of physical leakages are essential to minimise vulnerabilities associ...

Internet of Things: Concept, Implementation and Challenges

Conference Proceeding
Gunathilake, N. A., Al-Dubai, A., & Buchanan, W. J. (in press)
Internet of Things: Concept, Implementation and Challenges. In International Conference on IoT and its Applications (ICIA) 2020
Through the technical advancements over five generations, today's digital communication has become much smarter, more intelligent and punctual. This causes a massive amount of...

PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism

Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Buchanan, W. (2020)
PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism. In ICVISP 2020: Proceedings of the 2020 4th International Conference on Vision, Image and Signal Processing. https://doi.org/10.1145/3448823.3448875
The original consensus algorithm-Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ether...

Recent Advances and Trends in Lightweight Cryptography for IoT Security

Conference Proceeding
Gunathilake, N. A., Al-Dubai, A., & Buchanan, W. J. (2020)
Recent Advances and Trends in Lightweight Cryptography for IoT Security. https://doi.org/10.23919/cnsm50824.2020.9269083
Lightweight cryptography is a novel diversion from conventional cryptography to minimise its high level of resource requirements, thus it would impeccably fit in the internet-...

Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL)

Journal Article
Wadhaj, I., Ghaleb, B., Thomson, C., Al-Dubai, A., & Buchanen, B. (2020)
Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL). IEEE Access, 8, 43665-43675. https://doi.org/10.1109/ACCESS.2020.2977476
Destination Advertisement Objects (DAOs) are sent upward by RPL nodes toward the DODAG root, to build the downward routing paths carrying traffic from the root to its associat...

A new efficient distributed route discovery for wireless mobile ad hoc networks.

Conference Proceeding
Bani Khalaf, M., Al-Dubai, A., & Buchanan, W. J. (2012)
A new efficient distributed route discovery for wireless mobile ad hoc networks. In Wireless Telecommunications Symposium (WTS), 2012, (1-6). https://doi.org/10.1109/WTS.2012.6266129
High performance group communication, such as broadcast, requires matching efficient broadcast algorithms to effective route discovery approach. Broadcast communication in MAN...

A new adaptive broadcasting approach for mobile ad hoc networks

Conference Proceeding
Bani Khalaf, M., Al-Dubai, A., & Buchanan, W. J. (2010)
A new adaptive broadcasting approach for mobile ad hoc networks. In Proceedings of 2010 6th Conference on Wireless Advanced (WiAD). , (1-6). https://doi.org/10.1109/WIAD.2010.5544944
Mobile ad hoc networks (MANETs) have been gaining tremendous attention owing to the advances in wireless technologies accompanied by many applications and implementations. How...

Date


Date