Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.
Conference Proceeding
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016)
Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things
Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirem...
Ontology-based Course Teacher Assignment within Universities
Journal Article
Ashour, G., Al-Dubai, A., & Romdhani, I. (2020)
Ontology-based Course Teacher Assignment within Universities. International Journal of Advanced Computer Science and Applications, 11(7), https://doi.org/10.14569/ijacsa.2020.0110787
Educational institutions suffer from the enormous amount of data that keeps growing continuously. These data are usually scattered and unorganised, and it comes from different...
A critique of JCSP networking.
Conference Proceeding
Chalmers, K., Kerridge, J., & Romdhani, I. (2008)
A critique of JCSP networking. In P. H. Welch, S. Stepney, F. Polack, F. R. M. Barnes, A. McEwan, G. S. Stiles, …A. T. Sampson (Eds.), Communicating Process Architectures 2008, 271-291. doi:10.3233/978-1-58603-907-3-271
We present a critical investigation of the current implementation of JCSP Networking, examining in detail the structure and behavior of the current architecture. Information i...
BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC.
Book Chapter
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2017)
BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. In M. Grzenda, J. Furtak, J. Legierski, & A. I. Awad (Eds.), Advances in Networking Systems Architectures, Security, and Applications, (317-335). CHAM: Springer
The IEEE 802.15.4 standard supports both physical and Media Access Con-trol (MAC) layers of low rate Wireless Sensor Network (WSNs). However, this stand-ard considers only the...
A Trust-based Intrusion Detection System for Mobile RPL Based Networks
Conference Proceeding
Faiza, M., Tandjaoui, D., Romdhani, I., & Nabil, D. (2018)
A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.113
Successful deployment of Low power and Lossy Networks (LLNs) requires self-organising, self-configuring, security, and mobility support. However, these characteristics can be ...
A new efficient objective function for routing in Internet of Things paradigm
Conference Proceeding
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., & Gharibi, W. (2016)
A new efficient objective function for routing in Internet of Things paradigm. In 2016 IEEE Conference on Standards for Communications and Networking (CSCN). https://doi.org/10.1109/cscn.2016.7785168
Low Power and Lossy Networks (LLNs) have a crucial role in the Internet of Things (IoT) paradigm. For the IPv6 Routing Protocol for LLNs (RPL), two objective functions (OF) ha...
Experimental investigation of link layer adaptation in IEEE 802.11n WLANs
Conference Proceeding
Al-Adhami, M., Al-Dubai, A. Y., & Romdhani, I. (2012)
Experimental investigation of link layer adaptation in IEEE 802.11n WLANs. In 11th IEEE International Wireless Telecommunications Symposium, 1-7. https://doi.org/10.1109/wts.2012.6266144
Due to its low cost wireless communication methodology and improvements in both its physical (PHY) and MAC (Link) layers, the IEEE 802.11n wireless LAN (WLAN) technology has b...
On High Performance Multicast Algorithms for Interconnection Networks
Conference Proceeding
Al-Dubai, A., Ould-Khaoua, M., & Romdhani, I. (2006)
On High Performance Multicast Algorithms for Interconnection Networks. In M. Gerndt, & D. Kranzlmüller (Eds.), High Performance Computing and Communications; Lecture Notes in Computer Science, 330-339. doi:10.1007/11847366_34
Although multicast communication, in interconnection networks has been a major avenue for a lot of research works found in literature, there are several key issues that should...
Hierarchical Home Agent Architecture for Mobile IP Communications
Conference Proceeding
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006)
Hierarchical Home Agent Architecture for Mobile IP Communications. In 11th IEEE Symposium on Computers and Communications, 2006. ISCC '06. Proceedings, 136-141. doi:10.1109/iscc.2006.84
While the Mobile IP protocol does not exclude the use of multiple Home Agents (HAs), it does not impose any particular model either. Recent solutions propose that a mobile nod...
Addressing the DAO Insider Attack in RPL’s Internet of Things Networks
Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Qasem, M., Romdhani, I., & Mackenzie, L. (2018)
Addressing the DAO Insider Attack in RPL’s Internet of Things Networks. IEEE Communications Letters, 23(1), 68-71. https://doi.org/10.1109/LCOMM.2018.2878151
In RPL routing protocol, the DAO (Destination Advertisement Object) control messages are announced by the child nodes to their parents to build downward routes. A malicious in...