Research explorer tool

Date


Research Areas

Output Type

Download Available

8 results

Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings

Conference Proceeding
(2018)
Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings. In I. Romdhani, L. Shu, H. Takahiro, Z. Zhou, T. Gordon, & D. Zeng (Eds.), Collaborative Computing: Networking, Applications and Worksharinghttps://doi.org/10.1007/978-3-030-00916-8
This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, Collabora...

A new Zigbee-based device for measuring visual reaction time in sport activities

Conference Proceeding
Ali, B. B., Dugas, É., Naceur, A., & Romdhani, I. (2018)
A new Zigbee-based device for measuring visual reaction time in sport activities. In 2017 International Conference on Engineering & MIS (ICEMIS)https://doi.org/10.1109/icemis.2017.8273005
There is a growing demand for smart tools and devices that measure visual reaction time during sports and physical activities in outdoor environments. However, one of the majo...

Performance Evaluation of RPL Protocol under Mobile Sybil Attacks

Conference Proceeding
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017)
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESShttps://doi.org/10.1109/trustcom/bigdatase/icess.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...

Trust-Based Defence Model Against MAC Unfairness Attacks for IoT

Conference Proceeding
Djedjig, N., Tandjaoui, D., Romdhani, I., & Medjek, F. (2017)
Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In C. Westphall, K. El-Khatib, D. Krstić, & H. Menouar (Eds.), Proceedings of the Thirteenth International Conference on Wireless and Mobile Communications
The vulnerability of IoT networks makes channel access security a serious problem. The IEEE 802.15.4 MAC (Media Access Control) layer faces the risk of attacks from malicious ...

New trust metric for the RPL routing protocol

Conference Proceeding
Romdhani, I., Djedjig, N., Medjek, F., & Tandjaoui, D. (2017)
New trust metric for the RPL routing protocol. In 2017 8th International Conference on Information and Communication Systems (ICICS),https://doi.org/10.1109/iacs.2017.7921993
Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. ...

A new efficient objective function for routing in Internet of Things paradigm

Conference Proceeding
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., & Gharibi, W. (2016)
A new efficient objective function for routing in Internet of Things paradigm. In 2016 IEEE Conference on Standards for Communications and Networking (CSCN),https://doi.org/10.1109/cscn.2016.7785168
Low Power and Lossy Networks (LLNs) have a crucial role in the Internet of Things (IoT) paradigm. For the IPv6 Routing Protocol for LLNs (RPL), two objective functions (OF) ha...

A new distributed MIKEY mode to secure e-health applications.

Conference Proceeding
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2016)
A new distributed MIKEY mode to secure e-health applications. In V. Chang, V. Méndez Muñoz, R. Walters, G. Wills, & M. Ramachandran (Eds.), Proceedings of the International Conference on Internet of Things and Big Data, (88-95). https://doi.org/10.5220/0005945300880095
Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing...

Security and Routing Scoped IP Multicast Addresses

Conference Proceeding
Romdhani, I., Al-Dubai, A., & Kellil, M. (2009)
Security and Routing Scoped IP Multicast Addresses. In International Conference on Parallel Processing Workshops, 2009. ICPPW '09, (228 - 235). https://doi.org/10.1109/icppw.2009.81
IP multicast is an efficient and scalable network layer delivering method for multimedia content to a large number of receivers across the Internet. It saves the network bandw...