Integrated many-to-many multicast addressing and access control method
Romdhani, I., & Yassin Al-Dubai, A. (2009)
Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. https://doi.org/10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...
ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things
Qasem, M., Al-Dubai, A., Imed, R., & Yassien, M. B. (2015)
ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things. In ICEMIS '15 Proceedings of the The International Conference on Engineering & MIS 2015https://doi.org/10.1145/2832987.2833058
Energy is a precious resource in Internet of Things (IoT) especially with battery operated nodes, the overhead that consumes the battery power of the sensor nodes is a fundame...
Architecting the Internet of Things: State of the Art
Abdmeziem, M. R., Romdhani, I., & Tandjaoui, D. (2016)
Architecting the Internet of Things: State of the Art. In A. Koubaa, & E. Shakshuki (Eds.), Robots and Sensor Clouds; Studies in Systems, Decision and Control, (55-75). Springer. https://doi.org/10.1007/978-3-319-22168-7_3
Internet of things (IoT) constitutes one of the most important technological development in the last decade. It has the potential to deeply affect our life style. However, its...
A new dynamic weight clustering algorithm for wireless sensor networks
Essa, A., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2017)
A new dynamic weight clustering algorithm for wireless sensor networks. In S. Yang, J. Gao, Y. Zhang, K. Yang, V. C. M. Leung, & J. Hu (Eds.), Smart Grid Inspired Future Technologies: First International Conference, Liverpool, UK, May 19-20, 2016 SmartGIFT 2016, 195-203
Since sensor nodes have limited energy resources, prolonging network lifetime and improving scalability are essential elements in energy-efficient Wireless Sensor Networks (WS...
A new distributed MIKEY mode to secure e-health applications.
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2016)
A new distributed MIKEY mode to secure e-health applications. In V. Chang, V. Méndez Muñoz, R. Walters, G. Wills, & M. Ramachandran (Eds.), Proceedings of the International Conference on Internet of Things and Big Data, (88-95). https://doi.org/10.5220/0005945300880095
Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing...
Password Pattern and Vulnerability Analysis for Web and Mobile Applications
Li, S., Romdhani, I., & Buchanan, W. (2016)
Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006
Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile ...
Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks
Wadhaj, I., Kristof, I., Romdhani, I., & Al-Dubai, A. (2015)
Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks. In Proceedings of the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), (1600-1605). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.241
Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how ...
Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2018)
Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things. International Journal of Sensor Networks, 26(4), 227. https://doi.org/10.1504/ijsnet.2018.090462
E-health applications have emerged as a promising approach to provide unobtrusive and customizable support to elderly and frail people based on their situation and circumstanc...
Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable
Krstie, D., Romdhani, I., Yassein, M. M. B., Minić, S., Petković, G., & Milacic, P. (2015)
Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1620-1625). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.244
In this paper, ratio of product of two k-μ random variables and Nakagami-m random variable is analyzed. Statistical characteristics of ratio of product of two k-μ random varia...
Addressing the DAO Insider Attack in RPL’s Internet of Things Networks
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Qasem, M., Romdhani, I., & Mackenzie, L. (2018)
Addressing the DAO Insider Attack in RPL’s Internet of Things Networks. IEEE Communications Letters, 23(1), 68-71. https://doi.org/10.1109/LCOMM.2018.2878151
In RPL routing protocol, the DAO (Destination Advertisement Object) control messages are announced by the child nodes to their parents to build downward routes. A malicious in...