Trust-Based Defence Model Against MAC Unfairness Attacks for IoT
Conference Proceeding
Djedjig, N., Tandjaoui, D., Romdhani, I., & Medjek, F. (2017)
Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In C. Westphall, K. El-Khatib, D. Krstić, & H. Menouar (Eds.), Proceedings of the Thirteenth International Conference on Wireless and Mobile Communications
The vulnerability of IoT networks makes channel access security a serious problem. The IEEE 802.15.4 MAC (Media Access Control) layer faces the risk of attacks from malicious ...
A Trust-based Intrusion Detection System for Mobile RPL Based Networks
Conference Proceeding
Faiza, M., Tandjaoui, D., Romdhani, I., & Nabil, D. (2018)
A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.113
Successful deployment of Low power and Lossy Networks (LLNs) requires self-organising, self-configuring, security, and mobility support. However, these characteristics can be ...
New trust metric for the RPL routing protocol
Conference Proceeding
Romdhani, I., Djedjig, N., Medjek, F., & Tandjaoui, D. (2017)
New trust metric for the RPL routing protocol. In 2017 8th International Conference on Information and Communication Systems (ICICS),https://doi.org/10.1109/iacs.2017.7921993
Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. ...