Delegation of Authentication to the Data Plane in Software-Defined Networks
Almaini, A., Al-Dubai, A., Romdhani, I., & Schramm, M. (2020)
Delegation of Authentication to the Data Plane in Software-Defined Networks. In 2019 IEEE International Conferences on Ubiquitous Computing & Communications (IUCC) and Data Science and Computational Intelligence (DSCI) and Smart Computing, Networking and Services (SmartCNS), (58-65). https://doi.org/10.1109/iucc/dsci/smartcns.2019.00038
OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which ...
A new efficient objective function for routing in Internet of Things paradigm
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., & Gharibi, W. (2016)
A new efficient objective function for routing in Internet of Things paradigm. In 2016 IEEE Conference on Standards for Communications and Networking (CSCN). https://doi.org/10.1109/cscn.2016.7785168
Low Power and Lossy Networks (LLNs) have a crucial role in the Internet of Things (IoT) paradigm. For the IPv6 Routing Protocol for LLNs (RPL), two objective functions (OF) ha...
A new Zigbee-based device for measuring visual reaction time in sport activities
Ali, B. B., Dugas, É., Naceur, A., & Romdhani, I. (2018)
A new Zigbee-based device for measuring visual reaction time in sport activities. In 2017 International Conference on Engineering & MIS (ICEMIS)https://doi.org/10.1109/icemis.2017.8273005
There is a growing demand for smart tools and devices that measure visual reaction time during sports and physical activities in outdoor environments. However, one of the majo...
A Trust-based Intrusion Detection System for Mobile RPL Based Networks
Faiza, M., Tandjaoui, D., Romdhani, I., & Nabil, D. (in press)
A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.113
Successful deployment of Low power and Lossy Networks (LLNs) requires self-organising, self-configuring, security, and mobility support. However, these characteristics can be ...
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017)
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESShttps://doi.org/10.1109/trustcom/bigdatase/icess.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...
Trust-Based Defence Model Against MAC Unfairness Attacks for IoT
Djedjig, N., Tandjaoui, D., Romdhani, I., & Medjek, F. (2017)
Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In C. Westphall, K. El-Khatib, D. Krstić, & H. Menouar (Eds.), Proceedings of the Thirteenth International Conference on Wireless and Mobile Communications
The vulnerability of IoT networks makes channel access security a serious problem. The IEEE 802.15.4 MAC (Media Access Control) layer faces the risk of attacks from malicious ...
Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT
Ghaleb, B., Al-Dubai, A., Romdhani, I., Nasser, Y., & Boukerche, A. (2017)
Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC). , (1-6). https://doi.org/10.1109/icc.2017.7996819
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopte...
Performance evaluation of RPL metrics in environments with strained transmission ranges.
Thomson, C., Wadhaj, I., Romdhani, I., & Al-Dubai, A. (2017)
Performance evaluation of RPL metrics in environments with strained transmission ranges. In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA). https://doi.org/10.1109/aiccsa.2016.7945687
An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consisten...
Cross-Layer Multipath Multichannel MAC protocol for MANETs
Mirza, N., Taylor, H., Abdelshafy, M., King, P., Romdhani, I., & Alghamdi, A. (2018)
Cross-Layer Multipath Multichannel MAC protocol for MANETs. In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC)https://doi.org/10.1109/ISNCC.2018.8530886
Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure i...
Towards OWL 2 Natively Supported Fuzzy Cloud Ontology
Fang, D., Liu, X., Romdhani, I., & Zhao, H. (2012)
Towards OWL 2 Natively Supported Fuzzy Cloud Ontology. In 6th IEEE International Workshop Quality-Oriented Reuse of Software (IEEE QUORS’12), (328-333). https://doi.org/10.1109/compsacw.2012.66
Cloud Computing introduces a revolutionary paradigm of computing to Service Oriented Architecture (SOA), by provisioning various types of computational resources and applicati...