A Novel Multimodal Collaborative Drone-Assisted VANET Networking Model
Journal Article
Lin, N., Fu, L., Zhao, L., Min, G., Al-Dubai, A., & Gacanin, H. (2020)
A Novel Multimodal Collaborative Drone-Assisted VANET Networking Model. IEEE Transactions on Wireless Communications, 19(7), 4919-4933. https://doi.org/10.1109/TWC.2020.2988363
Drones can be used in many assistance roles in complex communication situations and play key roles as aerial wireless relays to help terrestrial network communications. Althou...
Routing Schemes in Software-Defined Vehicular Networks: Design, Open Issues and Challenges
Journal Article
Zhao, L., Al-Dubai, A., Zomaya, A. Y., Min, G., Hawbani, A., & Li, J. (2021)
Routing Schemes in Software-Defined Vehicular Networks: Design, Open Issues and Challenges. IEEE Intelligent Transportation Systems Magazine, 13(4), 217-226. https://doi.org/10.1109/MITS.2019.2953557
Software-defined vehicular networks (SDVN) is a promising technology to overcome the limitations of current vehicular networking. However, existing vehicular routing schemes a...
Trust-aware and Cooperative Routing Protocol for IoT Security
Journal Article
Djedjig, N., Tandjaoui, D., Medjek, F., & Romdhani, I. (2020)
Trust-aware and Cooperative Routing Protocol for IoT Security. Journal of Information Security and Applications, 52, https://doi.org/10.1016/j.jisa.2020.102467
The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification prov...
Towards The Creation of A Threat Intelligence Framework for Maritime Infrastructures
Conference Proceeding
Pitropakis, N., Logothetis, M., Andrienko, G., Karapistoli, I., Stephanatos, J., & Lambrinoudakis, C. (2020)
Towards The Creation of A Threat Intelligence Framework for Maritime Infrastructures. In Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT (53-68). https://doi.org/10.1007/978-3-030-42048-2_4
The maritime ecosystem has undergone through changes due to the increasing use of information systems and smart devices. The newly introduced technologies give rise to new att...
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset
Journal Article
Foley, J., Moradpoor, N., & Ochen, H. (2020)
Employing a Machine Learning Approach to Detect Combined Internet of Things Attacks Against Two Objective Functions Using a Novel Dataset. Security and Communication Networks, 2020, 1-17. https://doi.org/10.1155/2020/2804291
One of the important features of Routing Protocol for Low-Power and Lossy Networks (RPL) is Objective Function (OF). OF influences an IoT network in terms of routing strategie...
Impact of Relay Location of STANC Bi-Directional Transmission for Future Autonomous Internet of Things Applications
Journal Article
Tanoli, S. A. K., Shah, S. A., Khan, M. B., Nawaz, F., Hussain, A., Al-Dubai, A. Y., …Alsarhan, A. (2020)
Impact of Relay Location of STANC Bi-Directional Transmission for Future Autonomous Internet of Things Applications. IEEE Access, 8, 29395-29406. https://doi.org/10.1109/access.2020.2969750
Wireless communication using existing coding models poses several challenges for RF signals due to
multipath scattering, rapid fluctuations in signal strength and...
Delegation of Authentication to the Data Plane in Software-Defined Networks
Conference Proceeding
Almaini, A., Al-Dubai, A., Romdhani, I., & Schramm, M. (2020)
Delegation of Authentication to the Data Plane in Software-Defined Networks. In 2019 IEEE International Conferences on Ubiquitous Computing & Communications (IUCC) and Data Science and Computational Intelligence (DSCI) and Smart Computing, Networking and Services (SmartCNS), (58-65). https://doi.org/10.1109/iucc/dsci/smartcns.2019.00038
OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which ...
BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN
Conference Proceeding
Boukria, S., Guerroumi, M., & Romdhani, I. (2020)
BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN. In 2019 IEEE Symposium on Computers and Communications (ISCC) (1034-1039). https://doi.org/10.1109/ISCC47284.2019.8969780
Software Defined Networking (SDN) technology increases the evolution of Internet and network development. SDN, with its logical centralization of controllers and global networ...
FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment
Journal Article
Zhang, S., Liu, Y., Li, S., Tan, Z., Zhao, X., & Zhou, J. (2020)
FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment. IEEE Access, 8, 17356-17365. https://doi.org/10.1109/access.2020.2966399
Edge computing is a research hotspot that extends cloud computing to the edge of the network. Due to the recent developments in computation, storage and network technology for...
FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks
Journal Article
Lai, S., Fan, X., Ye, Q., Tan, Z., Zhang, Y., He, X., & Nanda, P. (2020)
FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks. IEEE Access, 8, 13516-13526. https://doi.org/10.1109/access.2020.2965562
Mobile cloud computing has emerged as a promising paradigm to facilitate computation-intensive and delay-sensitive mobile applications. Computation offloading services at the ...