Research explorer tool

Date


School

Research Areas

Download Available

53 results

Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.

Conference Proceeding
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016)
Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things
Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirem...

Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence

Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2017)
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence. ACM computing surveys, 50(1), 1-38. https://doi.org/10.1145/3041956
Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, inclu...

Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks

Conference Proceeding
Zhao, L., Al-Dubai, A. Y., & Romdhani, I. (2010)
Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks. In 2010 IEEE 10th International Conference on Computer and Information Technology (CIT),, (336-342). https://doi.org/10.1109/cit.2010.500
Wireless Mesh Networking (WMN) emerges as a new technology to reshape the broadband industry towards a more efficient and cost effective connectivity. The WMN has been the ide...

BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC.

Book Chapter
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2017)
BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. In M. Grzenda, J. Furtak, J. Legierski, & A. I. Awad (Eds.), Advances in Networking Systems Architectures, Security, and Applications, (317-335). CHAM: Springer
The IEEE 802.15.4 standard supports both physical and Media Access Con-trol (MAC) layers of low rate Wireless Sensor Network (WSNs). However, this stand-ard considers only the...

Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach

Conference Proceeding
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015)
Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. In M. Ganzha, L. Maciaszek, & M. Paprzycki (Eds.), Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, (1267-1272). https://doi.org/10.15439/2015F118
In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the de...

Student project performance management system for effective final year and dissertation projects supervision.

Presentation / Conference
Romdhani, I., Tawse, M., & Habibullah, S. (2011, November)
Student project performance management system for effective final year and dissertation projects supervision. Paper presented at London International Conference on Education LICE-2011, London, Uk
This paper presents the features of a new integrated and collaborative online supervision system for final year and dissertation projects. The system is currently under develo...

Password Pattern and Vulnerability Analysis for Web and Mobile Applications

Journal Article
Li, S., Romdhani, I., & Buchanan, W. (2016)
Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006
Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile ...

Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks

Conference Proceeding
Wadhaj, I., Kristof, I., Romdhani, I., & Al-Dubai, A. (2015)
Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks. In Proceedings of the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), (1600-1605). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.241
Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how ...

Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things

Journal Article
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2018)
Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things. International Journal of Sensor Networks, 26(4), 227. https://doi.org/10.1504/ijsnet.2018.090462
E-health applications have emerged as a promising approach to provide unobtrusive and customizable support to elderly and frail people based on their situation and circumstanc...

Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable

Conference Proceeding
Krstie, D., Romdhani, I., Yassein, M. M. B., Minić, S., Petković, G., & Milacic, P. (2015)
Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1620-1625). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.244
In this paper, ratio of product of two k-μ random variables and Nakagami-m random variable is analyzed. Statistical characteristics of ratio of product of two k-μ random varia...