10 results

Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things

Journal Article
Medjek, F., Tandjaoui, D., Djedjig, N., & Romdhani, I. (2021)
Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things. International Journal of Critical Infrastructure Protection, 34, https://doi.org/10.1016/j.ijcip.2021.100436
Internet of Things (IoT) has emerged as a key component of all advanced critical infrastructures. However, with the challenging nature of IoT, new security breaches have been ...

Trust-aware and Cooperative Routing Protocol for IoT Security

Journal Article
Djedjig, N., Tandjaoui, D., Medjek, F., & Romdhani, I. (2020)
Trust-aware and Cooperative Routing Protocol for IoT Security. Journal of Information Security and Applications, 52, https://doi.org/10.1016/j.jisa.2020.102467
The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification prov...

Addressing the DAO Insider Attack in RPL’s Internet of Things Networks

Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Qasem, M., Romdhani, I., & Mackenzie, L. (2018)
Addressing the DAO Insider Attack in RPL’s Internet of Things Networks. IEEE Communications Letters, 23(1), 68-71. https://doi.org/10.1109/LCOMM.2018.2878151
In RPL routing protocol, the DAO (Destination Advertisement Object) control messages are announced by the child nodes to their parents to build downward routes. A malicious in...

A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT

Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Romdhani, I., Nasser, Y., & Boukerche, A. (2018)
A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT. IEEE Internet of Things, 5(6), 12. https://doi.org/10.1109/JIOT.2018.2862364
In this paper, we introduce Drizzle, a new algorithm for maintaining routing information in the Low-power and Lossy Networks (LLNs). The aim is to address the limitations of t...

Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things

Journal Article
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2018)
Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things. International Journal of Sensor Networks, 26(4), 227. https://doi.org/10.1504/ijsnet.2018.090462
E-health applications have emerged as a promising approach to provide unobtrusive and customizable support to elderly and frail people based on their situation and circumstanc...

Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBAN)

Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2018)
Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBAN). IEEE Transactions on Green Communications and Networking, 1-1. https://doi.org/10.1109/tgcn.2018.2813060
Medium Access Control (MAC) protocols based on Time Division Multiple Access (TDMA) can improve the reliability and efficiency of WBAN. However, traditional static TDMA techni...

Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence

Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2017)
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence. ACM computing surveys, 50(1), 1-38. https://doi.org/10.1145/3041956
Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, inclu...

Password Pattern and Vulnerability Analysis for Web and Mobile Applications

Journal Article
Li, S., Romdhani, I., & Buchanan, W. (2016)
Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006
Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile ...

An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation

Journal Article
Fang, D., Liu, X., Romdhani, I., Jamshidi, P., & Pahl, C. (2016)
An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation. Future Generation Computer Systems, 56, 11-26. https://doi.org/10.1016/j.future.2015.09.025
Cloud computing enables a revolutionary paradigm of consuming ICT services. However, due to the inadequately described service information, users often feel confused while try...

An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework

Journal Article
Fang, D., Liu, X., Romdhani, I., & Pahl, C. (2015)
An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework. Journal of cloud computing advances, systems and applications, 4(1), https://doi.org/10.1186/s13677-015-0039-3
Cloud computing offers various computational resources via convenient on-demand service provision. Currently, heterogeneous services and cloud resources are usually utilized a...