Research explorer tool

38 results

Trust-Based Defence Model Against MAC Unfairness Attacks for IoT

Conference Proceeding
Djedjig, N., Tandjaoui, D., Romdhani, I., & Medjek, F. (2017)
Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In C. Westphall, K. El-Khatib, D. Krstić, & H. Menouar (Eds.), Proceedings of the Thirteenth International Conference on Wireless and Mobile Communications
The vulnerability of IoT networks makes channel access security a serious problem. The IEEE 802.15.4 MAC (Media Access Control) layer faces the risk of attacks from malicious ...

Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks

Conference Proceeding
Mirza, N. S., King, P. J. B., Romdhani, I., Abdelshafy, M. A., & Alghamdi, A. A. (2017)
Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks. In Wireless and Mobile Computing, Networking and Communications (WiMob)https://doi.org/10.1109/wimob.2017.8115854
The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads...

Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT

Conference Proceeding
Ghaleb, B., Al-Dubai, A., Romdhani, I., Nasser, Y., & Boukerche, A. (2017)
Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC), (1-6). https://doi.org/10.1109/icc.2017.7996819
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopte...

Performance evaluation of RPL metrics in environments with strained transmission ranges.

Conference Proceeding
Thomson, C., Wadhaj, I., Romdhani, I., & Al-Dubai, A. (2017)
Performance evaluation of RPL metrics in environments with strained transmission ranges. In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA)https://doi.org/10.1109/aiccsa.2016.7945687
An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consisten...

Cross-Layer Multipath Multichannel MAC protocol for MANETs

Conference Proceeding
Mirza, N., Taylor, H., Abdelshafy, M., King, P., Romdhani, I., & Alghamdi, A. (2018)
Cross-Layer Multipath Multichannel MAC protocol for MANETs. In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC)https://doi.org/10.1109/ISNCC.2018.8530886
Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure i...

An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks

Conference Proceeding
Eshaftri, M. A., Al-Dubai, A. Y., Romdhani, I., & Yassein, M. B. (2015)
An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks. In G. Anderst-Kotsis, I. Khalil, M. Steinbaur, & L. Chen (Eds.), MoMM 2015 Proceedings of The 13th International Conference on Advances in Mobile Computing and Multimedia, (189-194). https://doi.org/10.1145/2837126.2837149
In Wireless Sensor Networks (WSNs), clustering techniques are among the effective solutions to reduce energy consumption and prolong the network lifetime. During the iterative...

A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things

Conference Proceeding
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015)
A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. In I. C. Society, & I. C. Society (Eds.), 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1118-1122). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.167
Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However...

A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK)

Conference Proceeding
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015)
A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), (1109-1117). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.166
It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and...

A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval.

Conference Proceeding
Fang, D., Liu, X., & Romdhani, I. (2015)
A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval. In W. Zimmerman, Y. W. Lee, & C. Reich (Eds.), Cloud Computing 2014: the Fifth International Conference on Cloud Computing, Grids and Virtualization, 6-11
As cloud services propagate along with the rapid development of cloud computing, issues raised in service selection and retrieval processes become increasingly critical. While...

Mobile IP conditional binding update.

Conference Proceeding
Romdhani, I., & Al-Dubai, A. (2007)
Mobile IP conditional binding update. In 1st IEEE Workshop on Autonomic Communication and Network Management ACNM-2007, 10th IFIP/IEEE Symposium on Integrated Management, 64-70
Mobile IP protocols use a correspondent registration procedure between a Mobile Node (MN) and its Correspondent Nodes (CNs) to maintain a valid and up-to-date binding associat...