Trust-aware and Cooperative Routing Protocol for IoT Security
Djedjig, N., Tandjaoui, D., Medjek, F., & Romdhani, I. (2020)
Trust-aware and Cooperative Routing Protocol for IoT Security. Journal of Information Security and Applications, 52, https://doi.org/10.1016/j.jisa.2020.102467
The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification prov...
An authentication protocol based on chaos and zero knowledge proof
Major, W., Buchanan, W. J., & Ahmad, J. (2020)
An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dynamics, 99, 3065-3087. https://doi.org/10.1007/s11071-020-05463-3
Port Knocking is a method for authenticating clients through a closed stance firewall, and authorising their requested actions, enabling severs to offer services to authentica...
MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features
Saha, R., Geetha, G., Kumar, G., Kim, T., & Buchanan, W. J. (2019)
MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features. IEEE Access, 7, 172045-172054. https://doi.org/10.1109/access.2019.2956160
The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weigh...
A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers
Han, T., Jan, S., Tan, T., Usman, M., Jan, M., Khan, R., & Xu, Y. (2020)
A Comprehensive Survey of Security Threats and their Mitigation Techniques for next-generation SDN Controllers. Concurrency and Computation: Practice and Experience, 32(16), https://doi.org/10.1002/cpe.5300
Software Dened Network (SDN) and Network Virtualization (NV) are emerged paradigms that simplied the control and management of the next generation networks, most importantly...
A Forensic Audit of the Tor Browser Bundle
Muir, M., Leimich, P., & Buchanan, W. J. (2019)
A Forensic Audit of the Tor Browser Bundle. Digital Investigation, 29, 118-128. https://doi.org/10.1016/j.diin.2019.03.009
The increasing use of encrypted data within file storage and in network communications leaves investigators with many challenges. One of the most challenging is the Tor protoc...
Decrypting Live SSH Traffic in Virtual Environments
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019)
Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010
Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts re...
Top 10 Blockchain Predictions for the (Near) Future of Healthcare
Halamka, J. D., Alterovitz, G., Buchanan, W. J., Cenaj, T., Clauson, K. A., Dhillon, V., …Ngo, A. L. (2019)
Top 10 Blockchain Predictions for the (Near) Future of Healthcare. Blockchain in Healthcare Today, 2, doi:10.30953/bhty.v2.106
To review blockchain lessons learned in 2018 and near-future predictions for blockchain in healthcare, Blockchain in Healthcare Today (BHTY) asked the world's blockchain in he...
Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2019)
Design of Multi-View Based Email Classification for IoT Systems via Semi-Supervised Learning. Journal of Network and Computer Applications, 128, 56-63. https://doi.org/10.1016/j.jnca.2018.12.002
Suspicious emails are one big threat for Internet of Things (IoT) security, which aim to induce users to click and then redirect them to a phishing webpage. To protect IoT sys...
SMK-means: An Improved Mini Batch K-means Algorithm Based on Mapreduce with Big Data
Xiao, B., Wang, Z., Liu, Q., & Liu, X. (2018)
SMK-means: An Improved Mini Batch K-means Algorithm Based on Mapreduce with Big Data. Computers, Materials & Continua, 56(3), 365-379. https://doi.org/10.3970/cmc.2018.01830
In recent years, the rapid development of big data technology has also been favored by more and more scholars. Massive data storage and calculation problems have also been sol...
Copy-move forgery detection using combined features and transitive matching
Lin, C., Lu, W., Huang, X., Liu, K., Sun, W., Lin, H., & Tan, Z. (2019)
Copy-move forgery detection using combined features and transitive matching. Multimedia Tools and Applications, 78(21), 30081-30096. https://doi.org/10.1007/s11042-018-6922-4
Recently, the research of Internet of Things (IoT) and Multimedia Big Data (MBD) has been growing tremendously. Both IoT and MBD have a lot of multimedia data, which can be ta...