FH-MAC: A Multi-Channel Hybrid MAC Protocol for Wireless Mesh Networks
Tandjaoui, D., Doudou, M., & Romdhani, I. (2009)
FH-MAC: A Multi-Channel Hybrid MAC Protocol for Wireless Mesh Networks. International Journal of Grid and High Performance Computing, 1(4), 40-56. https://doi.org/10.4018/jghpc.2009070804
In this article, the authors propose a new hybrid MAC protocol named H-MAC for wireless mesh networks. This protocol combines CSMA and TDMA schemes according to the contention...
Experimental investigation of link layer adaptation in IEEE 802.11n WLANs
Al-Adhami, M., Al-Dubai, A. Y., & Romdhani, I. (2012)
Experimental investigation of link layer adaptation in IEEE 802.11n WLANs. In 11th IEEE International Wireless Telecommunications Symposium, 1-7. https://doi.org/10.1109/wts.2012.6266144
Due to its low cost wireless communication methodology and improvements in both its physical (PHY) and MAC (Link) layers, the IEEE 802.11n wireless LAN (WLAN) technology has b...
IP mobile multicast: Challenges and solutions
Romdhani, I., Kellil, M., Lach, H., Bouabdallah, A., & Bettahar, H. (2003)
IP mobile multicast: Challenges and solutions. Communications Surveys and Tutorials, IEEE Communications Society, 6(1), (18-41). doi:10.1109/comst.2004.5342232. ISSN 1553-877X
This article outlines the challenges of IP multicast over Mobile IP. Then it provides a comprehensive overview of existing multicast solutions to handle mobile sources and
Hierarchical Home Agent Architecture for Mobile IP Communications
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006)
Hierarchical Home Agent Architecture for Mobile IP Communications. In 11th IEEE Symposium on Computers and Communications, 2006. ISCC '06. Proceedings, 136-141. doi:10.1109/iscc.2006.84
While the Mobile IP protocol does not exclude the use of multiple Home Agents (HAs), it does not impose any particular model either. Recent solutions propose that a mobile nod...
Integrated many-to-many multicast addressing and access control method
Romdhani, I., & Yassin Al-Dubai, A. (2009)
Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications, 649-654. https://doi.org/10.1109/iscc.2009.5202288
IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on t...
ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things
Qasem, M., Al-Dubai, A., Imed, R., & Yassien, M. B. (2015)
ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things. In ICEMIS '15 Proceedings of the The International Conference on Engineering & MIS 2015https://doi.org/10.1145/2832987.2833058
Energy is a precious resource in Internet of Things (IoT) especially with battery operated nodes, the overhead that consumes the battery power of the sensor nodes is a fundame...
Architecting the Internet of Things: State of the Art
Abdmeziem, M. R., Romdhani, I., & Tandjaoui, D. (2016)
Architecting the Internet of Things: State of the Art. In A. Koubaa, & E. Shakshuki (Eds.), Robots and Sensor Clouds; Studies in Systems, Decision and Control, (55-75). Springer. https://doi.org/10.1007/978-3-319-22168-7_3
Internet of things (IoT) constitutes one of the most important technological development in the last decade. It has the potential to deeply affect our life style. However, its...
A new Zigbee-based device for measuring visual reaction time in sport activities
Ali, B. B., Dugas, É., Naceur, A., & Romdhani, I. (2018)
A new Zigbee-based device for measuring visual reaction time in sport activities. In 2017 International Conference on Engineering & MIS (ICEMIS)https://doi.org/10.1109/icemis.2017.8273005
There is a growing demand for smart tools and devices that measure visual reaction time during sports and physical activities in outdoor environments. However, one of the majo...
A Trust-based Intrusion Detection System for Mobile RPL Based Networks
Faiza, M., Tandjaoui, D., Romdhani, I., & Nabil, D. (in press)
A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.113
Successful deployment of Low power and Lossy Networks (LLNs) requires self-organising, self-configuring, security, and mobility support. However, these characteristics can be ...
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017)
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESShttps://doi.org/10.1109/trustcom/bigdatase/icess.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...