Skip to main content

Research Repository

Advanced Search

All Outputs (59)

Reliability and energy efficiency enhancement in wireless body area networks for e-health (2017)
Presentation / Conference Contribution
Salayma, M., Al-Dubai, A., & Romdhani, I. (2017). Reliability and energy efficiency enhancement in wireless body area networks for e-health. In 2016 19th Conference of Open Innovations Association (FRUCT). https://doi.org/10.23919/FRUCT.2016.7892202

Wireless Body Area Network (WBAN) is a technology that revolutionises our understanding of the future digitised healthcare systems. WBAN has unique challenges and features compared to other wireless sensor networks. In addition to battery power consu... Read More about Reliability and energy efficiency enhancement in wireless body area networks for e-health.

A new efficient objective function for routing in Internet of Things paradigm (2016)
Presentation / Conference Contribution
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., & Gharibi, W. (2016, October). A new efficient objective function for routing in Internet of Things paradigm. Presented at 2016 IEEE Conference on Standards for Communications and Networking (CSCN)

Low Power and Lossy Networks (LLNs) have a crucial role in the Internet of Things (IoT) paradigm. For the IPv6 Routing Protocol for LLNs (RPL), two objective functions (OF) have been standardized so far, namely (Objective Function zero (OF0), and the... Read More about A new efficient objective function for routing in Internet of Things paradigm.

3LS-authenticate: an e-commerce challenge-response mobile application. (2016)
Presentation / Conference Contribution
Molla, R., Romdhani, I., & Buchanan, B. (2016, November). 3LS-authenticate: an e-commerce challenge-response mobile application. Paper presented at 13th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2016

The rapid growth of e-commerce has been associated with a number of security concerns, which challenge its continual success. In view of this, an investigative study determining the most secure and convenient solution to protect online clients has be... Read More about 3LS-authenticate: an e-commerce challenge-response mobile application..

Weight Driven Cluster Head Rotation for Wireless Sensor Networks (2016)
Presentation / Conference Contribution
Eshaftri, M. A., Al-Dubai, A. Y., Romdhani, I., & Essa, A. (2016, November). Weight Driven Cluster Head Rotation for Wireless Sensor Networks. Presented at Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media - MoMM '16, Singapore

Energy efficiency is one of the major issues in Wireless Sensor Networks (WSNs), due to the limited power and processing capabilities of the Sensor Nodes (SNs). The clustering techniques proved to be the effective solution to improve the energy effic... Read More about Weight Driven Cluster Head Rotation for Wireless Sensor Networks.

Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things (2016)
Presentation / Conference Contribution
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016, June). Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things. Presented at 5th IEEE International Conference on Mobile Services, San Francisco, USA

Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirements of low-power and low-processing devices. To address this issue, we com... Read More about Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.

A new distributed MIKEY mode to secure e-health applications. (2016)
Presentation / Conference Contribution
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2016, April). A new distributed MIKEY mode to secure e-health applications. Presented at International Conference on Internet of Things and Big Data (IoTBD 2016)

Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing standard based protocols. Among these protocols, MIKEY (Multimedia Interne... Read More about A new distributed MIKEY mode to secure e-health applications..

A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK) (2015)
Presentation / Conference Contribution
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015, October). A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and mission-critical sensing tasks, securing multicast applications is therefo... Read More about A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK).

Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable (2015)
Presentation / Conference Contribution
Krstie, D., Romdhani, I., Yassein, M. M. B., Minić, S., Petković, G., & Milacic, P. (2015, October). Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable. Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

In this paper, ratio of product of two k-μ random variables and Nakagami-m random variable is analyzed. Statistical characteristics of ratio of product of two k-μ random variables and Nakagami-m random variable can be applied in performance analysis... Read More about Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable.

A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things (2015)
Presentation / Conference Contribution
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015, October). A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However, a regular update process causes extra signaling overhead and drains the n... Read More about A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things.

Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks (2015)
Presentation / Conference Contribution
Wadhaj, I., Kristof, I., Romdhani, I., & Al-Dubai, A. (2015, October). Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks. Presented at 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing

Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how a routing protocol for low-power and lossy-networks such as (RPL) would per... Read More about Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks.

An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks (2015)
Presentation / Conference Contribution
Eshaftri, M. A., Al-Dubai, A. Y., Romdhani, I., & Yassein, M. B. (2015, December). An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks. Presented at Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia - MoMM 2015

In Wireless Sensor Networks (WSNs), clustering techniques are among the effective solutions to reduce energy consumption and prolong the network lifetime. During the iterative re-clustering process, extra energy and time are consumed especially at th... Read More about An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks.

Mobility And Energy Extensions For The IEEE 802.15.4 Standard (2015)
Presentation / Conference Contribution
Romdhani, I., Al-Dubai, A. Y., & Guibene, W. (2015, December). Mobility And Energy Extensions For The IEEE 802.15.4 Standard. Presented at Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia - MoMM 2015

The IEEE 802.15.4 standard is designed for low-power and low-rate wireless Personal Area Networks. Although energy is a key parameter in shaping the communication and interaction methods of wireless sensor nodes, the specification of the MAC layer do... Read More about Mobility And Energy Extensions For The IEEE 802.15.4 Standard.

A New Energy Efficient Cluster based Protocol for Wireless Sensor Networks (2015)
Presentation / Conference Contribution
Eshaftri, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015, September). A New Energy Efficient Cluster based Protocol for Wireless Sensor Networks. Presented at Proceedings of the 2015 Federated Conference on Computer Science and Information Systems

In Wireless Sensor Networks (WSNs), clustering techniques are usually used as a key effective solution to reduce energy consumption and prolong the network lifetime. Despite many works on clustering in WSNs, this issue is still, however, in its infan... Read More about A New Energy Efficient Cluster based Protocol for Wireless Sensor Networks.

Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach (2015)
Presentation / Conference Contribution
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015, September). Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. Presented at Proceedings of the 2015 Federated Conference on Computer Science and Information Systems

In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the design of WSN energy efficient algorithms and standards. The standard IEEE 80... Read More about Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach.

ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things (2015)
Presentation / Conference Contribution
Qasem, M., Al-Dubai, A., Imed, R., & Yassien, M. B. (2015, September). ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things. Presented at Proceedings of the The International Conference on Engineering & MIS 2015 - ICEMIS '15

Energy is a precious resource in Internet of Things (IoT) especially with battery operated nodes, the overhead that consumes the battery power of the sensor nodes is a fundamental problem. This overhead is mainly caused by the frequent update message... Read More about ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things.

A load-balancing cluster based protocol for Wireless Sensor Networks. (2015)
Presentation / Conference Contribution
Eshaftri, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015, September). A load-balancing cluster based protocol for Wireless Sensor Networks. Paper presented at 4th International Conference on Wireless Sensor Networks (WSN'15)

A decentralized group key management protocol for mobile Internet of things (DBGK) (2015)
Presentation / Conference Contribution
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015, August). A decentralized group key management protocol for mobile Internet of things (DBGK). Paper presented at The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)

A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval. (2015)
Presentation / Conference Contribution
Fang, D., Liu, X., & Romdhani, I. (2015, May). A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval. Presented at Fifth International Conference on Cloud Computing, GRIDs, and Virtualization

As cloud services propagate along with the rapid development of cloud computing, issues raised in service selection and retrieval processes become increasingly critical. While many approaches are proposed on the specification and discovery of cloud s... Read More about A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval..

Mobile User Authentication System for E-commerce Applications. (2014)
Presentation / Conference Contribution
Molla, R., Romdhani, I., Buchanan, W. J., & Fadel, E. Y. (2014, June). Mobile User Authentication System for E-commerce Applications. Paper presented at International Conference on Advanced Networking, Distributed Systems and Applications 2014

E-commerce applications provide on-line clients and merchants with a quick and convenient way to exchange goods and services. However, the deployment of these applications is still facing many problems such as security threats; and on-line attacks. T... Read More about Mobile User Authentication System for E-commerce Applications..

Reliable Hierarchical Cluster Routing Protocol for Wireless Sensor Networks. (2014)
Presentation / Conference Contribution
Eshaftri, M., Essa, A., Qasem, M., Romdhani, I., & Al-Dubai, A. (2014, June). Reliable Hierarchical Cluster Routing Protocol for Wireless Sensor Networks. Paper presented at International Conference on Networking, Distributed Systems and Applications : INDS 2014, Bejaia, Algeria

Wireless sensor networks (WSNs) have recently become an integral part of a wide range of systems such as surveillance, target tracking, security and health management systems. WSNs deploy a large number of sensor nodes that cooperate to... Read More about Reliable Hierarchical Cluster Routing Protocol for Wireless Sensor Networks..