Lecturer in Cybersecurity
Clavie, B., & Moradpoor, N. (in press). Two Communities, One Topic: Exploring the British Reddit community split based on perceived biases. In Proceedings of posters presented at 10th ACM Conference on Web Science
This article explores a perceived bias between two British reddit
communities dedicated to discussing British politics.We analyse the
popular sources favoured by each communit...
Mirza, N., Taylor, H., Abdelshafy, M., King, P., Romdhani, I., & Alghamdi, A. (in press). Cross-Layer Multipath Multichannel MAC protocol for MANETs. In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC)
Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure i...
Ali, B. B., Dugas, É., Naceur, A., & Romdhani, I. (2018). A new Zigbee-based device for measuring visual reaction time in sport activities. In 2017 International Conference on Engineering & MIS (ICEMIS)doi:10.1109/icemis.2017.8273005
There is a growing demand for smart tools and devices that measure visual reaction time during sports and physical activities in outdoor environments. However, one of the majo...
Wireless sensor networks (WSNs) and Internet of things are among the top potential new technologies that dramatically alter the world and the way we live and work. Indeed, in recent decades, the need ...
Scottish Funding Council
The development of interesting use cases for IPv6.
Carnegie Trust for the Universities of Scotland
This short research visit aims at building research collaborative links with the Texas A & M University at Qatar and the University of Qatar
27 September 2017
27 September 2017
A well studied subtask of Natural Language Generation (NLG) is Referring Expression Generation (REG) that studies the automatic generation of a description of an entity in a w...
01 February 2017
Associate Professor of audio Engineering
Zero Hour Lecturer
Senior Research Fellow
Lecturer of Cybersecurity, Encryption and Networks
Ghaleb, B., & Al-Dubai, A. (2018). Leaf-based Routing Mechanism for Low-Power and Lossy Networks. 1800668.4. Intellectual Property Office, UK
Unlike existing solutions, our invention provides a “Leaf-Based” mechanism for establishing the Downward routes in Low-Power and Lossy Networks (LLNs) that seeks to provide a ...
Mirza, N. S., King, P. J. B., Abdelshafy, M. A., Alghamdi, A. A., Romdhani, I., Mirza, N., …A. Alghamdi, A. (2017). Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks. In Wireless and Mobile Computing, Networking and Communications (WiMob)doi:10.1109/wimob.2017.8115854
The route recovery algorithm is a crucial part of
an ad hoc routing protocol. Designing an efficient and fast route
recovery mechanism scheme without incurring extra overheads...
Esriaftri, M. A., Essa, A., Al-Dubai, A. Y., Romdhani, I., & Eshaftri, M. A. (2017). A New Weight based Rotating Clustering Scheme for WSNs. In 2017 International Symposium on Networks, Computers and Communications (ISNCC)doi:10.1109/ISNCC.2017.8072000
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely ...
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017). Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESSdoi:10.1109/trustcom/bigdatase/icess.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Ghaleb, B., Al-Dubai, A., Romdhani, I., Nasser, Y., & Boukerche, A. (2017). Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC), 1-6. doi:10.1109/icc.2017.7996819
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopte...
Djedjig, N., Tandjaoui, D., Romdhani, I., & Medjek, F. (2017). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In C. Westphall, K. El-Khatib, D. Krstić, & H. Menouar (Eds.), Proceedings of the Thirteenth International Conference on Wireless and Mobile Communications
The vulnerability of IoT networks makes channel
access security a serious problem. The IEEE 802.15.4 MAC
(Media Access Control) layer faces the risk of attacks from
Ghaleb, B., Al-Dubai, A., Ekonomou, E., & Wadhaj, I. (2017). A new enhanced RPL based routing for Internet of Things. In 2017 IEEE International Conference on Communications, 1-6. doi:10.1109/ICCW.2017.7962723
The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently standardized for routing in the constrained Internet of Things networks. Unfortunately, the ...
Asif, R. & Buchanan, W. J. (2017). Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)ISBN 978-1-5090-5880-8
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...
Thomson, C., Wadhaj, I., Romdhani, I., & Al-Dubai, A. (2017). Performance evaluation of RPL metrics in environments with strained transmission ranges. In Computer Systems and Applications (AICCSA),doi:10.1109/AICCSA.2016.7945687
An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consisten...
Romdhani, I., Djedjig, N., Medjek, F., & Tandjaoui, D. (2017). New Trust Metric for the RPL Routing Protocol. In 2017 8th International Conference on Information and Communication Systems (ICICS),doi:10.1109/IACS.2017.7921993
Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. ...
Faiza, M., Tandjaoui, D., Romdhani, I. & Nabil, D. (in press). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)ISBN unknown
Successful deployment of Low power and Lossy
Networks (LLNs) requires self-organising, self-configuring, security,
and mobility support. However, these characteristics can be
Salayma, M., Al-Dubai, A., & Romdhani, I. (2017). Reliability and energy efficiency enhancement in wireless body area networks for e-health. In 2016 19th Conference of Open Innovations Association (FRUCT)doi:10.23919/FRUCT.2016.7892202
Wireless Body Area Network (WBAN) is a technology that revolutionises our understanding of the future digitised healthcare systems. WBAN has unique challenges and features com...
Royal Society of Edinburgh
Ubiquitous Computing promises to enrich our everyday lives by enabling the environment to be enhanced via compu...
"The development of science and technology are increasingly affecting and changing the nature of processes in...
Swarm robotics is a special case within the general field of robotics. The distributed nature makes it...