New trust metric for the RPL routing protocol
Conference Proceeding
Romdhani, I., Djedjig, N., Medjek, F., & Tandjaoui, D. (2017)
New trust metric for the RPL routing protocol. In 2017 8th International Conference on Information and Communication Systems (ICICS),https://doi.org/10.1109/iacs.2017.7921993
Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. ...
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence
Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2017)
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence. ACM computing surveys, 50(1), 1-38. https://doi.org/10.1145/3041956
Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, inclu...
Reliability and energy efficiency enhancement in wireless body area networks for e-health
Conference Proceeding
Salayma, M., Al-Dubai, A., & Romdhani, I. (2017)
Reliability and energy efficiency enhancement in wireless body area networks for e-health. In 2016 19th Conference of Open Innovations Association (FRUCT)https://doi.org/10.23919/FRUCT.2016.7892202
Wireless Body Area Network (WBAN) is a technology that revolutionises our understanding of the future digitised healthcare systems. WBAN has unique challenges and features com...
Securing the Internet of Things
Book
Romdhani, I. (2017)
Li, S. & Da Xu, L. (Eds.). Securing the Internet of Things. Elsevier. ISBN 9780128044582
Key Features
Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures
Explores how the threats...
BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC.
Book Chapter
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2017)
BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. In M. Grzenda, J. Furtak, J. Legierski, & A. I. Awad (Eds.), Advances in Networking Systems Architectures, Security, and Applications, (317-335). CHAM: Springer
The IEEE 802.15.4 standard supports both physical and Media Access Con-trol (MAC) layers of low rate Wireless Sensor Network (WSNs). However, this stand-ard considers only the...
Weight Driven Cluster Head Rotation for Wireless Sensor Networks
Conference Proceeding
Eshaftri, M. A., Al-Dubai, A. Y., Romdhani, I., & Essa, A. (2016)
Weight Driven Cluster Head Rotation for Wireless Sensor Networks. In B. Abdulrazak, E. Pardede, M. Steinbauer, I. Khalil, & G. Anderst-Kotsis (Eds.), Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media MoMM'16, (327-331). https://doi.org/10.1145/3007120.3007170
Energy efficiency is one of the major issues in Wireless Sensor Networks (WSNs), due to the limited power and processing capabilities of the Sensor Nodes (SNs). The clustering...
Password Pattern and Vulnerability Analysis for Web and Mobile Applications
Journal Article
Li, S., Romdhani, I., & Buchanan, W. (2016)
Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006
Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile ...
A new distributed MIKEY mode to secure e-health applications.
Conference Proceeding
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2016)
A new distributed MIKEY mode to secure e-health applications. In V. Chang, V. Méndez Muñoz, R. Walters, G. Wills, & M. Ramachandran (Eds.), Proceedings of the International Conference on Internet of Things and Big Data, (88-95). https://doi.org/10.5220/0005945300880095
Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing...
Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks
Conference Proceeding
Wadhaj, I., Kristof, I., Romdhani, I., & Al-Dubai, A. (2015)
Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks. In Proceedings of the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), (1600-1605). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.241
Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how ...
A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things
Conference Proceeding
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015)
A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. In I. C. Society, & I. C. Society (Eds.), 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1118-1122). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.167
Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However...