Date


School

Research Areas

Download Available

58 results

A New Weight based Rotating Clustering Scheme for WSNs

Conference Proceeding
Essa, A., Al-Dubai, A. Y., Romdhani, I., & Esriaftri, M. A. (2017)
A New Weight based Rotating Clustering Scheme for WSNs. In 2017 International Symposium on Networks, Computers and Communications (ISNCC)https://doi.org/10.1109/ISNCC.2017.8072000
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely ...

Performance Evaluation of RPL Protocol under Mobile Sybil Attacks

Conference Proceeding
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017)
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESShttps://doi.org/10.1109/trustcom/bigdatase/icess.2017.351
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of...

Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT

Conference Proceeding
Ghaleb, B., Al-Dubai, A., Romdhani, I., Nasser, Y., & Boukerche, A. (2017)
Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC). , (1-6). https://doi.org/10.1109/icc.2017.7996819
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopte...

Trust-Based Defence Model Against MAC Unfairness Attacks for IoT

Conference Proceeding
Djedjig, N., Tandjaoui, D., Romdhani, I., & Medjek, F. (2017)
Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In C. Westphall, K. El-Khatib, D. Krstić, & H. Menouar (Eds.), Proceedings of the Thirteenth International Conference on Wireless and Mobile Communications
The vulnerability of IoT networks makes channel access security a serious problem. The IEEE 802.15.4 MAC (Media Access Control) layer faces the risk of attacks from malicious ...

New trust metric for the RPL routing protocol

Conference Proceeding
Romdhani, I., Djedjig, N., Medjek, F., & Tandjaoui, D. (2017)
New trust metric for the RPL routing protocol. In 2017 8th International Conference on Information and Communication Systems (ICICS),https://doi.org/10.1109/iacs.2017.7921993
Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. ...

Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence

Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2017)
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence. ACM computing surveys, 50(1), 1-38. https://doi.org/10.1145/3041956
Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, inclu...

Reliability and energy efficiency enhancement in wireless body area networks for e-health

Conference Proceeding
Salayma, M., Al-Dubai, A., & Romdhani, I. (2017)
Reliability and energy efficiency enhancement in wireless body area networks for e-health. In 2016 19th Conference of Open Innovations Association (FRUCT)https://doi.org/10.23919/FRUCT.2016.7892202
Wireless Body Area Network (WBAN) is a technology that revolutionises our understanding of the future digitised healthcare systems. WBAN has unique challenges and features com...

Securing the Internet of Things

Book
Romdhani, I. (2017)
Li, S. & Da Xu, L. (Eds.). Securing the Internet of Things. Elsevier. ISBN 9780128044582
Key Features Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures Explores how the threats...

BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC.

Book Chapter
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2017)
BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. In M. Grzenda, J. Furtak, J. Legierski, & A. I. Awad (Eds.), Advances in Networking Systems Architectures, Security, and Applications, (317-335). CHAM: Springer
The IEEE 802.15.4 standard supports both physical and Media Access Con-trol (MAC) layers of low rate Wireless Sensor Network (WSNs). However, this stand-ard considers only the...

3LS-authenticate: an e-commerce challenge-response mobile application.

Presentation / Conference
Molla, R., Romdhani, I., & Buchanan, B. (2016, November)
3LS-authenticate: an e-commerce challenge-response mobile application. Paper presented at 13th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2016, Agadir, Morocco
The rapid growth of e-commerce has been associated with a number of security concerns, which challenge its continual success. In view of this, an investigative study determini...