Skip to main content

Showing 1–7 of 7 results for author: Jaroucheh, Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.02795  [pdf, other

    cs.CR

    PermutEx: Feature-Extraction-Based Permutation -- A New Diffusion Scheme for Image Encryption Algorithms

    Authors: Muhammad Shahbaz Khan, Jawad Ahmad, Ahmed Al-Dubai, Zakwan Jaroucheh, Nikolaos Pitropakis, William J. Buchanan

    Abstract: Traditional permutation schemes mostly focus on random scrambling of pixels, often neglecting the intrinsic image information that could enhance diffusion in image encryption algorithms. This paper introduces PermutEx, a feature-extraction-based permutation method that utilizes inherent image features to scramble pixels effectively. Unlike random permutation schemes, PermutEx extracts the spatial… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

  2. arXiv:2310.05032  [pdf, other

    cs.CR

    PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks

    Authors: Hisham Ali, Mwrwan Abubakar, Jawad Ahmad, William J. Buchanan, Zakwan Jaroucheh

    Abstract: In recent years, there has been a significant proliferation of industrial Internet of Things (IoT) applications, with a wide variety of use cases being developed and put into operation. As the industrial IoT landscape expands, the establishment of secure and reliable infrastructure becomes crucial to instil trust among users and stakeholders, particularly in addressing fundamental concerns such as… ▽ More

    Submitted 8 October, 2023; originally announced October 2023.

  3. arXiv:2305.10025  [pdf

    cs.NI cs.CR

    Resolving the Decreased Rank Attack in RPL's IoT Networks

    Authors: B. Ghaleb, A. Al-Dubai, A. Hussain, J. Ahmad, I. Romdhani, Z. Jaroucheh

    Abstract: The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core communication technology for the Internet of Things (IoT) networks. RPL organizes its network in the form of a tree-like structure where a node is co… ▽ More

    Submitted 17 May, 2023; originally announced May 2023.

  4. arXiv:2112.10124  [pdf, other

    cs.CR

    Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates

    Authors: Mwrwan Abubakar, Pádraig McCarron, Zakwan Jaroucheh, Ahmed Al-Dubai, William J Buchanan

    Abstract: The COVID-19 pandemic has recently emerged as a worldwide health emergency that necessitates coordinated international measures. To contain the virus's spread, governments and health organisations raced to develop vaccines that would lower Covid-19 morbidity, relieve pressure on healthcare systems, and allow economies to open. As a way forward after the COVID-19 vaccination, the Vaccination certif… ▽ More

    Submitted 21 December, 2021; v1 submitted 19 December, 2021; originally announced December 2021.

    Journal ref: IEEE SINCONF 2021 (14th International Conference on Security of Information and Networks)

  5. arXiv:2112.10092  [pdf, other

    cs.CR

    Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

    Authors: Hisham Ali, Pavlos Papadopoulos, Jawad Ahmad, Nikolaos Pitropakis, Zakwan Jaroucheh, William J. Buchanan

    Abstract: Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the risk of a potential cyberattack - the requirements for threat information sharing range from simplistic sharing of documents to threat intelligence sh… ▽ More

    Submitted 19 December, 2021; originally announced December 2021.

    Journal ref: IEEE SINCONF 2021: 14th International Conference on Security of Information and Networks

  6. TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies

    Authors: Zakwan Jaroucheh, Mohamad Alissa, William J Buchanan

    Abstract: The growing trend of sharing news/contents, through social media platforms and the World Wide Web has been seen to impact our perception of the truth, altering our views about politics, economics, relationships, needs and wants. This is because of the growing spread of misinformation and disinformation intentionally or unintentionally by individuals and organizations. This trend has grave politica… ▽ More

    Submitted 28 August, 2020; originally announced August 2020.

    Comments: arXiv admin note: text overlap with arXiv:1812.00315, arXiv:1807.06346, arXiv:1904.05386 by other authors

    Journal ref: 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada, 2020, pp. 1-3

  7. SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain

    Authors: Zakwan Jaroucheh, Baraq Ghaleb, William J Buchanan

    Abstract: The proof-of-work consensus protocol suffers from two main limitations: waste of energy and offering only probabilistic guarantees about the status of the blockchain. This paper introduces SklCoin, a new Byzantine consensus protocol and its corresponding software architecture. This protocol leverages two ideas: 1) the proof-of-stake concept to dynamically form stake proportionate consensus groups… ▽ More

    Submitted 15 August, 2020; originally announced August 2020.

    Journal ref: IEEE Conference on Software Architecture Companion, 143-150, 2020