Skip to main content

Showing 1–3 of 3 results for author: Al-Khateeb, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2209.12041  [pdf

    cs.CR

    Blockchain technologies in the design of Industrial Control Systems for Smart Cities

    Authors: Gabriela Ahmadi-Assalemi, Haider Al-Khateeb

    Abstract: The proliferation of sensor technologies in Industrial Control Systems (ICS) helped to transform the environment towards better automation, process control and monitoring. However, sensor technologies expose the smart cities of the future to complex security challenges. Luckily, the sensing capabilities also create opportunities to capture various data types, which apart from operational use can a… ▽ More

    Submitted 24 September, 2022; originally announced September 2022.

    Comments: 8 pages, 5 figures

    Journal ref: published in IEEE Blockchain Technical Briefs, 2022, https://blockchain.ieee.org/technicalbriefs

  2. Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks

    Authors: Gregory Epiphaniou, Petros Karadimas, Dhouha Kbaier Ben Ismail, Haider Al-Khateeb, Ali Dehghantanha, Kim-Kwang Raymond Choo

    Abstract: The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised for the generation of highly random and symmetric cryptographic keys. However, in a physical-layer key agreement scheme, non-reciprocity due to inherent channel noise and hardware impairments can propagate bit disagreements. This has to be addressed prior to the symmetric key generation which is inh… ▽ More

    Submitted 3 August, 2018; originally announced August 2018.

    Comments: 10 Pages

  3. Adaptive Traffic Fingerprinting for Darknet Threat Intelligence

    Authors: Hamish Haughey, Gregory Epiphaniou, Haider Al-Khateeb, Ali Dehghantanha

    Abstract: Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes. However, anonymity in cyberspace has always been a domain of conflicting interests. While it gives enough power to nefarious actors to masquerade… ▽ More

    Submitted 3 August, 2018; originally announced August 2018.

    Comments: 26 pages