Date


School

Download Available

65 results

A new distributed MIKEY mode to secure e-health applications.

Conference Proceeding
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2016)
A new distributed MIKEY mode to secure e-health applications. In V. Chang, V. Méndez Muñoz, R. Walters, G. Wills, & M. Ramachandran (Eds.), Proceedings of the International Conference on Internet of Things and Big Data, (88-95). https://doi.org/10.5220/0005945300880095
Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing...

Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks

Conference Proceeding
Wadhaj, I., Kristof, I., Romdhani, I., & Al-Dubai, A. (2015)
Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks. In Proceedings of the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), (1600-1605). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.241
Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how ...

A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things

Conference Proceeding
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015)
A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. In I. C. Society, & I. C. Society (Eds.), 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1118-1122). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.167
Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However...

A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK)

Conference Proceeding
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015)
A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), (1109-1117). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.166
It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and...

Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable

Conference Proceeding
Krstie, D., Romdhani, I., Yassein, M. M. B., Minić, S., Petković, G., & Milacic, P. (2015)
Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1620-1625). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.244
In this paper, ratio of product of two k-μ random variables and Nakagami-m random variable is analyzed. Statistical characteristics of ratio of product of two k-μ random varia...

Mobility And Energy Extensions For The IEEE 802.15.4 Standard

Conference Proceeding
Romdhani, I., Al-Dubai, A. Y., & Guibene, W. (2015)
Mobility And Energy Extensions For The IEEE 802.15.4 Standard. In L. Luke Chen, M. Steinbauer, I. Khalil, & G. Anderst-Kotsis (Eds.), Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, (318-321). https://doi.org/10.1145/2837126.2837167
The IEEE 802.15.4 standard is designed for low-power and low-rate wireless Personal Area Networks. Although energy is a key parameter in shaping the communication and interact...

An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks

Conference Proceeding
Eshaftri, M. A., Al-Dubai, A. Y., Romdhani, I., & Yassein, M. B. (2015)
An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks. In G. Anderst-Kotsis, I. Khalil, M. Steinbaur, & L. Chen (Eds.), MoMM 2015 Proceedings of The 13th International Conference on Advances in Mobile Computing and Multimedia, (189-194). https://doi.org/10.1145/2837126.2837149
In Wireless Sensor Networks (WSNs), clustering techniques are among the effective solutions to reduce energy consumption and prolong the network lifetime. During the iterative...

A New Energy Efficient Cluster based Protocol for Wireless Sensor Networks

Conference Proceeding
Eshaftri, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015)
A New Energy Efficient Cluster based Protocol for Wireless Sensor Networks. In I. C. Society (Ed.), 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), (1209-1214). https://doi.org/10.15439/2015F193
In Wireless Sensor Networks (WSNs), clustering techniques are usually used as a key effective solution to reduce energy consumption and prolong the network lifetime. Despite m...

An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation

Journal Article
Fang, D., Liu, X., Romdhani, I., Jamshidi, P., & Pahl, C. (2016)
An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation. Future Generation Computer Systems, 56, 11-26. https://doi.org/10.1016/j.future.2015.09.025
Cloud computing enables a revolutionary paradigm of consuming ICT services. However, due to the inadequately described service information, users often feel confused while try...

Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach

Conference Proceeding
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015)
Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. In M. Ganzha, L. Maciaszek, & M. Paprzycki (Eds.), Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, (1267-1272). https://doi.org/10.15439/2015F118
In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the de...
6 results

Date


Date