Lecturer of Cybersecurity, Encryption and Networks
Romdhani, I., Mirza, N., King, P., Abdelshafy, M. & A. Alghamdi, A. (in press). Reliable Multipath Multi-channel Route Migration over Multi Link-Failure in Wireless Ad Hoc Networks. In Proceedings of WiMob'2017ISBN n/a
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Romdhani, I., Nabil, D., Medjek, F. & Tandjaoui, D. (in press). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In Proceedings of the Thirteenth International Conference on Wireless and Mobile CommunicationsISBN na
The vulnerability of IoT networks makes channel
access security a serious problem. The IEEE 802.15.4 MAC
(Media Access Control) layer faces the risk of attacks from
Asif, R. & Buchanan, W. J. (2017). Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)ISBN 978-1-5090-5880-8
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...
Wireless sensor networks (WSNs) and Internet of things are among the top potential new technologies that dramatically alter the world and the way we live and work. Indeed, in recent decades, the need ...
Scottish Funding Council
The development of interesting use cases for IPv6.
Carnegie Trust for the Universities of Scotland
This short research visit aims at building research collaborative links with the Texas A & M University at Qatar and the University of Qatar. .
01 February 2017
Lecturer in Cybersecurity and Networks
Senior Research Fellow
Romdhani, I., Faiza, M., Tandjaoui, D. & Djedjig, N. (in press). Performance Evaluation of RPL Protocol Under Mobile Sybil Attacks. In International Symposium on Security, Privacy and Trust in Internet of Things (SPTIoT 2017ISBN n/a
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Faiza, M., Tandjaoui, D., Romdhani, I. & Nabil, D. (in press). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)ISBN unknown
Successful deployment of Low power and Lossy
Networks (LLNs) requires self-organising, self-configuring, security,
and mobility support. However, these characteristics can be
Salayma, M., Al-Dubai, A. & Romdhani, I. (2017). Reliability and Energy Efficiency Enhancement in Wireless Body Area Networks for E-Health. In 2016 19th Conference of Open Innovations Association (FRUCT)doi:10.23919/FRUCT.2016.7892202. ISBN 978-952-68397-4-5, 978-1-5090-6188-4
Wireless Body Area Network (WBAN) is a technology that revolutionises our understanding of the future digitised healthcare systems. WBAN has unique challenges and features com...
Alsnousi, E., Al-Dubai, A., Romdhani, I. & Eshaftri, M. (in press). A New Weight based Rotating Clustering Scheme for WSNs. In Proceedings of ISNCC-2017 WMCN
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely ...
Ben Ali, B., Dugas, É., Naceur, A. & Romdhani, I. (in press). A New Zigbee-based Device for Measuring Visual Reaction Time in Sport Activities. In IEEE ICEMIS 2017
There is a growing demand for smart tools and devices that measure visual reaction time during sports and physical activities in outdoor environments. However, one of the majo...
Romdhani, I., Djedjig, N., Medjek, F. & Tandjaoui, D. (in press). New Trust Metric for the RPL Routing Protocol. In Proceedings of ICICS 2017
Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. ...
Essa, A., Al-Dubai, A., Romdhani, I. & Eshaftri, M. (2016). A new dynamic weight clustering algorithm for wireless sensor networks. In Yang, S., Gao, J., Zhang, Y., Yang, K., Leung, V. C. M. & Hu, J. (Eds.). Smart Grid Inspired Future Technologies: First International Conference, Liverpool, UK, May 19-20, 2016 SmartGIFT 2016, 195-203. ISBN 978-3-319-47729-9, 978-3-319-47728-2
Since sensor nodes have limited energy resources, prolonging network lifetime and improving scalability are essential elements in energy-efficient Wireless Sensor Networks (WS...
Zeb, K., Saleem, K., Al Muhtadi, J. & Thuemmler, C. (2016). U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), 562-567. doi:10.1109/HealthCom.2016.7749518. ISBN 978-1-5090-3370-6
Cybersecurity in the health care domain is one of the most important and critical issues of this era. In fact, it was reported in 2014 that on the black market medical records...
(2016). Outlook 17 A New Generation of e-Health Systems Powered by 5G
Standardized 5G systems will be market ready around 2020. What is clear is that 5G will be more than a simple evolution of the current network. Indeed, it will be a catalyst f...
Romdhani, I., Eshaftri, M., Al-Dubai, A. & Essa, A. (in press). Weight Driven Cluster Head Rotation for Wireless Sensor Networks
Energy efficiency is one of the major issues in Wireless Sensor
Networks (WSNs), due to the limited power and processing
capabilities of the Sensor Nodes (SNs). The clustering...
Abdmeziem, M. R., Tandjaoui, D. & Romdhani, I. (2016). A new distributed MIKEY mode to secure e-health applications. In Chang, V., Méndez Muñoz, V., Walters, R., Wills, G. & Ramachandran, M. (Eds.). Proceedings of the International Conference on Internet of Things and Big Data, 88-95. doi:10.5220/0005945300880095. ISBN 978-989-758-183-0
Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing...
Wadhaj, I., Kristof, I., Romdhani, I. & Al-Dubai, A. (2015). Performance evaluation of the RPL Protocol in fixed and mobile sinks low-power and lossy networks. In Proceedings of the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), 1600-1605. doi:10.1109/CIT/IUCC/DASC/PICOM.2015.241. ISBN 978-1-5090-0153-8
Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how ...
Royal Society of Edinburgh
"The development of science and technology are increasingly affecting and changing the nature of processes in...