Skip to main content

Research Repository

Advanced Search

Outputs (103)

Securing the Internet of Things (2017)
Book
Romdhani, I. (2017). S. Li, & L. Da Xu (Eds.), Securing the Internet of Things. Elsevier

Key Features

Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures
Explores how the threats in IoT are different from traditional ad hoc or infrastructural network... Read More about Securing the Internet of Things.

BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. (2017)
Book Chapter
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2017). BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. In M. Grzenda, J. Furtak, J. Legierski, & A. I. Awad (Eds.), Advances in Networking Systems Architectures, Security, and Applications (317-335). Springer

The IEEE 802.15.4 standard supports both physical and Media Access Con-trol (MAC) layers of low rate Wireless Sensor Network (WSNs). However, this stand-ard considers only the ideal linear power consumption, omitting the fact that the diffu-sion prin... Read More about BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC..

A new efficient objective function for routing in Internet of Things paradigm (2016)
Presentation / Conference Contribution
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., & Gharibi, W. (2016, October). A new efficient objective function for routing in Internet of Things paradigm. Presented at 2016 IEEE Conference on Standards for Communications and Networking (CSCN)

Low Power and Lossy Networks (LLNs) have a crucial role in the Internet of Things (IoT) paradigm. For the IPv6 Routing Protocol for LLNs (RPL), two objective functions (OF) have been standardized so far, namely (Objective Function zero (OF0), and the... Read More about A new efficient objective function for routing in Internet of Things paradigm.

3LS-authenticate: an e-commerce challenge-response mobile application. (2016)
Presentation / Conference Contribution
Molla, R., Romdhani, I., & Buchanan, B. (2016, November). 3LS-authenticate: an e-commerce challenge-response mobile application. Paper presented at 13th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2016

The rapid growth of e-commerce has been associated with a number of security concerns, which challenge its continual success. In view of this, an investigative study determining the most secure and convenient solution to protect online clients has be... Read More about 3LS-authenticate: an e-commerce challenge-response mobile application..

Weight Driven Cluster Head Rotation for Wireless Sensor Networks (2016)
Presentation / Conference Contribution
Eshaftri, M. A., Al-Dubai, A. Y., Romdhani, I., & Essa, A. (2016, November). Weight Driven Cluster Head Rotation for Wireless Sensor Networks. Presented at Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media - MoMM '16, Singapore

Energy efficiency is one of the major issues in Wireless Sensor Networks (WSNs), due to the limited power and processing capabilities of the Sensor Nodes (SNs). The clustering techniques proved to be the effective solution to improve the energy effic... Read More about Weight Driven Cluster Head Rotation for Wireless Sensor Networks.

Cooja Simulator Manual (2016)
Report
Thomson, C., Romdhani, I., Al-Dubai, A., Qasem, M., Ghaleb, B., & Wadhaj, I. (2016). Cooja Simulator Manual. Edinburgh: Edinburgh Napier University

While Cooja has been proven to be an ideal tool for the simulation of RPL in WSNs, there are challenges involved in its use, particularly in regard to a lack of documentation. The Contiki website provides an image of Instant Contiki which can then be... Read More about Cooja Simulator Manual.

Password Pattern and Vulnerability Analysis for Web and Mobile Applications (2016)
Journal Article
Li, S., Romdhani, I., & Buchanan, W. (2016). Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006

Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile applications based on conditions of the Shannon entropy, Guessing entropy a... Read More about Password Pattern and Vulnerability Analysis for Web and Mobile Applications.

Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things (2016)
Presentation / Conference Contribution
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016, June). Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things. Presented at 5th IEEE International Conference on Mobile Services, San Francisco, USA

Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirements of low-power and low-processing devices. To address this issue, we com... Read More about Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.

A new distributed MIKEY mode to secure e-health applications. (2016)
Presentation / Conference Contribution
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2016, April). A new distributed MIKEY mode to secure e-health applications. Presented at International Conference on Internet of Things and Big Data (IoTBD 2016)

Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing standard based protocols. Among these protocols, MIKEY (Multimedia Interne... Read More about A new distributed MIKEY mode to secure e-health applications..