Skip to main content

Research Repository

Advanced Search

All Outputs (91)

Blockchain for Cybersecurity in Cyber-Physical Systems (2023)
Book
Maleh, Y., Alazab, M., & Romdhani, I. (Eds.). (2023). Blockchain for Cybersecurity in Cyber-Physical Systems. Cham: Springer. https://doi.org/10.1007/978-3-031-25506-9

This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems. It presents crucial issues in this field and provides a sample of recent advances and insights into the research pr... Read More about Blockchain for Cybersecurity in Cyber-Physical Systems.

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence (2022)
Book
Maleh, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.). (2022). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. Gistrup, Denmark: River Publishers

In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for single users and businesses since even a single attack can result in compromise... Read More about Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence.

Ontology-Based Linked Data to Support Decision Making within Universities (2022)
Journal Article
Ashour, G., Al-Dubai, A., Romdhani, I., & Alghazzawi, D. (2022). Ontology-Based Linked Data to Support Decision Making within Universities. Mathematics, 10(17), Article 3148. https://doi.org/10.3390/math10173148

In recent years, educational institutions worked hard to automate their work using more trending technologies that prove the success in supporting decision-making processes. Most the decisions in educational institutions rely on rating the academic r... Read More about Ontology-Based Linked Data to Support Decision Making within Universities.

Multicast DIS attack mitigation in RPL-based IoT-LLNs (2021)
Journal Article
Medjek, F., Tandjaoui, D., Djedjig, N., & Romdhani, I. (2021). Multicast DIS attack mitigation in RPL-based IoT-LLNs. Journal of Information Security and Applications, 61, Article 102939. https://doi.org/10.1016/j.jisa.2021.102939

The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was standardised by the IETF ROLL Working Group to address the routing issues in the Internet of Things (IoT) Low-Power and Lossy Networks (LLNs). RPL builds and maintains a Destination... Read More about Multicast DIS attack mitigation in RPL-based IoT-LLNs.

Artificial Intelligence and Blockchain for Future Cybersecurity Applications (2021)
Book
Maleh, Y., Baddi, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.). (2021). Artificial Intelligence and Blockchain for Future Cybersecurity Applications. Cham: Springer. https://doi.org/10.1007/978-3-030-74575-2

Presents the state-of-the-art and the latest discoveries in the field of Artificial Intelligence and Blockchain techniques and methods for future cybersecurity applications Proposes new models, practical solutions and technological advances related... Read More about Artificial Intelligence and Blockchain for Future Cybersecurity Applications.

Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things (2021)
Journal Article
Medjek, F., Tandjaoui, D., Djedjig, N., & Romdhani, I. (2021). Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things. International Journal of Critical Infrastructure Protection, 34, Article 100436. https://doi.org/10.1016/j.ijcip.2021.100436

Internet of Things (IoT) has emerged as a key component of all advanced critical infrastructures. However, with the challenging nature of IoT, new security breaches have been introduced, especially against the Routing Protocol for Low-power and Lossy... Read More about Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things.

Ontology-based Course Teacher Assignment within Universities (2020)
Journal Article
Ashour, G., Al-Dubai, A., & Romdhani, I. (2020). Ontology-based Course Teacher Assignment within Universities. International Journal of Advanced Computer Science and Applications, 11(7), https://doi.org/10.14569/ijacsa.2020.0110787

Educational institutions suffer from the enormous amount of data that keeps growing continuously. These data are usually scattered and unorganised, and it comes from different resources with different formats. Besides, modernization vision within the... Read More about Ontology-based Course Teacher Assignment within Universities.

Big data and IoT-based applications in smart environments: A systematic review (2020)
Journal Article
Hajjaji, Y., Boulila, W., Farah, I. R., Romdhani, I., & Hussain, A. (2021). Big data and IoT-based applications in smart environments: A systematic review. Computer Science Review, 39, Article 100318. https://doi.org/10.1016/j.cosrev.2020.100318

This paper reviews big data and Internet of Things (IoT)-based applications in smart environments. The aim is to identify key areas of application, current trends, data architectures, and ongoing challenges in these fields. To the best of our knowled... Read More about Big data and IoT-based applications in smart environments: A systematic review.

Lightweight edge authentication for software defined networks (2020)
Journal Article
Almaini, A., Al-Dubai, A., Romdhani, I., Schramm, M., & Alsarhan, A. (2021). Lightweight edge authentication for software defined networks. Computing, 103, https://doi.org/10.1007/s00607-020-00835-4

OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While... Read More about Lightweight edge authentication for software defined networks.

An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University (2020)
Presentation / Conference Contribution
Ashour, G., Al-Dubai, A., Romdhani, I., & Aljohani, N. (2020, June). An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University. Presented at 2020 International Conference Engineering Technologies and Computer Science (EnT), Moscow, Russia

Educational data is growing continuously. This huge amount of data that is scattered and come from different resources with different formats usually is noisy, duplicated, inconsistent, and unorganized. These data can be more efficient and usable whe... Read More about An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University.

Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications (2020)
Book
Maleh, Y., Shojaafar, M., Alazab, M., & Romdhani, I. (Eds.). (2020). Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. CRC Press

Blockchain Technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction... Read More about Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications.

Towards the Development of Rapid and Low-Cost Pathogen Detection Systems Using Microfluidic Technology and Optical Image Processing (2020)
Journal Article
Kerrouche, A., Lithgow, J., Muhammad, I., & Romdhani, I. (2020). Towards the Development of Rapid and Low-Cost Pathogen Detection Systems Using Microfluidic Technology and Optical Image Processing. Applied Sciences, 10(7), Article 2527. https://doi.org/10.3390/app10072527

Waterborne pathogens affect all waters globally and proceed to be an ongoing concern. Previous methods for detection of pathogens consist of a high test time and a high sample consumption, but they are very expensive and require specialist operators.... Read More about Towards the Development of Rapid and Low-Cost Pathogen Detection Systems Using Microfluidic Technology and Optical Image Processing.

Trust-aware and Cooperative Routing Protocol for IoT Security (2020)
Journal Article
Djedjig, N., Tandjaoui, D., Medjek, F., & Romdhani, I. (2020). Trust-aware and Cooperative Routing Protocol for IoT Security. Journal of Information Security and Applications, 52, Article 102467. https://doi.org/10.1016/j.jisa.2020.102467

The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to... Read More about Trust-aware and Cooperative Routing Protocol for IoT Security.

Delegation of Authentication to the Data Plane in Software-Defined Networks (2020)
Presentation / Conference Contribution
Almaini, A., Al-Dubai, A., Romdhani, I., & Schramm, M. (2019, October). Delegation of Authentication to the Data Plane in Software-Defined Networks. Presented at 2019 IEEE International Conferences on Ubiquitous Computing & Communications (IUCC) and Data Science and Computational Intelligence (DSCI) and Smart Computing, Networking and Services (SmartCNS), Shenyang, China

OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While... Read More about Delegation of Authentication to the Data Plane in Software-Defined Networks.

BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN (2020)
Presentation / Conference Contribution
Boukria, S., Guerroumi, M., & Romdhani, I. (2020). BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN. In 2019 IEEE Symposium on Computers and Communications (ISCC) (1034-1039). https://doi.org/10.1109/ISCC47284.2019.8969780

Software Defined Networking (SDN) technology increases the evolution of Internet and network development. SDN, with its logical centralization of controllers and global network overview changes the network's characteristics, on term of flexibility, a... Read More about BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN.

Cross-Layer Multipath Multichannel MAC protocol for MANETs (2018)
Presentation / Conference Contribution
Mirza, N., Taylor, H., Abdelshafy, M., King, P., Romdhani, I., & Alghamdi, A. (2018, June). Cross-Layer Multipath Multichannel MAC protocol for MANETs. Presented at The International Symposium on Networks, Computers and Communications (ISNCC), Rome, Italy

Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure is detected. However, depending on a stale route to recover from a broken li... Read More about Cross-Layer Multipath Multichannel MAC protocol for MANETs.

Crowdfunding Can Serve as a Pathway to Higher Education (2018)
Book Chapter
Romdhani, I., El Youssi, A., Al Mennai, M., Babah, E., & Yahya, R. (2018). Crowdfunding Can Serve as a Pathway to Higher Education. In M. Mohieldin, & D. Petkoski (Eds.), Financing Sustainable Development: Ideas for Action 2018 (43-49)

The Al-Derb platform provides a way for individual and group funding (crowdfunding) to help young people obtain grants for high-quality online education and training courses offered by universities and training centers. The availability of high-quali... Read More about Crowdfunding Can Serve as a Pathway to Higher Education.

Addressing the DAO Insider Attack in RPL’s Internet of Things Networks (2018)
Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Qasem, M., Romdhani, I., & Mackenzie, L. (2019). Addressing the DAO Insider Attack in RPL’s Internet of Things Networks. IEEE Communications Letters, 23(1), 68-71. https://doi.org/10.1109/LCOMM.2018.2878151

In RPL routing protocol, the DAO (Destination Advertisement Object) control messages are announced by the child nodes to their parents to build downward routes. A malicious insider node can exploit this feature to send fake DAOs to its parents period... Read More about Addressing the DAO Insider Attack in RPL’s Internet of Things Networks.

Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings (2018)
Presentation / Conference Contribution
(2017, December). Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings. Presented at CollaborateCom 2017, Edinburgh, UK

This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2017, held in Edinburgh, UK, in December 2017. The 65 papers presente... Read More about Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings.

A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT (2018)
Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Romdhani, I., Nasser, Y., & Boukerche, A. (2018). A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT. IEEE Internet of Things Journal, 5(6), 12. https://doi.org/10.1109/JIOT.2018.2862364

In this paper, we introduce Drizzle, a new algorithm for maintaining routing information in the Low-power and Lossy Networks (LLNs). The aim is to address the limitations of the currently standardized routing maintenance (i.e. Trickle algorithm) in s... Read More about A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT.