Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme
Journal Article
Sher Khan, J., Koç Kayhan, S., Siddiq Ahmed, S., Ahmad, J., Ayesha Siddiqa, H., Ahmed, F., …Al Dubai, A. (2022)
Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme. Wireless Personal Communications, 125, 513-530. https://doi.org/10.1007/s11277-022-09562-9
Due to the increased number of cyberattacks, numerous researchers are motivated towards the design of such schemes that can hide digital information in a signal. Watermarking ...
Internet of Things: Concept, Implementation and Challenges
Conference Proceeding
Gunathilake, N. A., Al-Dubai, A., & Buchanan, W. J. (2022)
Internet of Things: Concept, Implementation and Challenges. In Internet of Things and Its Applications: Select Proceedings of ICIA 2020 (145-155). https://doi.org/10.1007/978-981-16-7637-6_14
Through the technical advancements over five generations, today's digital communication has become much smarter, more intelligent and punctual. This causes a massive amount of...
A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution
Journal Article
Arif, J., Khan, M. A., Ghaleb, B., Ahmad, J., Munir, A., Rashid, U., & Al-Dubai, A. Y. (2022)
A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution. IEEE Access, 10, 12966-12982. https://doi.org/10.1109/access.2022.3146792
Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images’ privacy, chaos-based image encryption algorith...
Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems
Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. (2021)
Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. In 2021 5th Cyber Security in Networking Conference (CSNet). https://doi.org/10.1109/csnet52717.2021.9614646
The Session Initiation Protocol (SIP) is the principal signalling protocol in Voice over IP (VoIP) systems, responsible for initialising, terminating, and maintaining sessions...
A Novel Prediction-Based Temporal Graph Routing Algorithm for Software-Defined Vehicular Networks
Journal Article
Zhao, L., Li, Z., Al-Dubai, A., Min, G., Li, J., Hawbani, A., & Zomaya, A. (2022)
A Novel Prediction-Based Temporal Graph Routing Algorithm for Software-Defined Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems, 23(8), 13275-13290. https://doi.org/10.1109/TITS.2021.3123276
Temporal information is critical for routing computation in the vehicular network. It plays a vital role in the vehicular network. Till now, most existing routing schemes in v...
A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data
Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. J. (2021)
A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data. In 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS). https://doi.org/10.1109/coins51742.2021.9524172
Recent years have seen an increase in medical big data, which can be attributed to a paradigm shift experienced in medical data sharing induced by the growth of medical techno...
A New Annulus-based Distribution Algorithm for Scalable IoT-driven LoRa Networks
Conference Proceeding
Alahmadi, H., Bouabdallah, F., & Al-Dubai, A. (2021)
A New Annulus-based Distribution Algorithm for Scalable IoT-driven LoRa Networks. In ICC 2021 - IEEE International Conference on Communicationshttps://doi.org/10.1109/ICC42927.2021.9500407
Long-Range (LoRa) has been a major avenue for deploying the Internet of Things (IoT) in large scale environments due to its long-scale connection, energy efficiency, and cost-...
Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT
Conference Proceeding
Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (2021)
Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT. In 10th International Conference on Cryptography and Information Security (CRYPIS 2021) (185-205
Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, continuous observations of physical leakages are essential to minimise vulnerabilities associ...
FLORA: Fuzzy based Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs
Journal Article
Wu, W., Wang, X., Hawbani, A., Liu, P., Zhao, L., & Al-Dubai, A. (in press)
FLORA: Fuzzy based Load-Balanced Opportunistic Routing for Asynchronous Duty-Cycled WSNs. IEEE Transactions on Mobile Computing, https://doi.org/10.1109/TMC.2021.3074739
Existing Opportunistic routing (OR) schemes work well with asynchronous duty-cycled wireless sensor networks (WSNs), which effectively reduces the sender waiting time by broad...
A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node
Journal Article
Thomson, C., Wadhaj, I., Tan, Z., & Al-Dubai, A. (2021)
A Mobility Aware Duty Cycling and Preambling Solution for Wireless Sensor Network with Mobile Sink Node. Wireless Networks, 27(5), 3423-3439. https://doi.org/10.1007/s11276-021-02580-8
Utilising the mobilisation of a sink node in a wireless sensor network to combat the energy hole, or hotspot issue, is well referenced. However, another issue , that of energy...