Skip to main content

Research Repository

Advanced Search

All Outputs (19)

Ontology-Based Linked Data to Support Decision Making within Universities (2022)
Journal Article
Ashour, G., Al-Dubai, A., Romdhani, I., & Alghazzawi, D. (2022). Ontology-Based Linked Data to Support Decision Making within Universities. Mathematics, 10(17), Article 3148. https://doi.org/10.3390/math10173148

In recent years, educational institutions worked hard to automate their work using more trending technologies that prove the success in supporting decision-making processes. Most the decisions in educational institutions rely on rating the academic r... Read More about Ontology-Based Linked Data to Support Decision Making within Universities.

Multicast DIS attack mitigation in RPL-based IoT-LLNs (2021)
Journal Article
Medjek, F., Tandjaoui, D., Djedjig, N., & Romdhani, I. (2021). Multicast DIS attack mitigation in RPL-based IoT-LLNs. Journal of Information Security and Applications, 61, Article 102939. https://doi.org/10.1016/j.jisa.2021.102939

The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was standardised by the IETF ROLL Working Group to address the routing issues in the Internet of Things (IoT) Low-Power and Lossy Networks (LLNs). RPL builds and maintains a Destination... Read More about Multicast DIS attack mitigation in RPL-based IoT-LLNs.

Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things (2021)
Journal Article
Medjek, F., Tandjaoui, D., Djedjig, N., & Romdhani, I. (2021). Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things. International Journal of Critical Infrastructure Protection, 34, Article 100436. https://doi.org/10.1016/j.ijcip.2021.100436

Internet of Things (IoT) has emerged as a key component of all advanced critical infrastructures. However, with the challenging nature of IoT, new security breaches have been introduced, especially against the Routing Protocol for Low-power and Lossy... Read More about Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things.

Ontology-based Course Teacher Assignment within Universities (2020)
Journal Article
Ashour, G., Al-Dubai, A., & Romdhani, I. (2020). Ontology-based Course Teacher Assignment within Universities. International Journal of Advanced Computer Science and Applications, 11(7), https://doi.org/10.14569/ijacsa.2020.0110787

Educational institutions suffer from the enormous amount of data that keeps growing continuously. These data are usually scattered and unorganised, and it comes from different resources with different formats. Besides, modernization vision within the... Read More about Ontology-based Course Teacher Assignment within Universities.

Big data and IoT-based applications in smart environments: A systematic review (2020)
Journal Article
Hajjaji, Y., Boulila, W., Farah, I. R., Romdhani, I., & Hussain, A. (2021). Big data and IoT-based applications in smart environments: A systematic review. Computer Science Review, 39, Article 100318. https://doi.org/10.1016/j.cosrev.2020.100318

This paper reviews big data and Internet of Things (IoT)-based applications in smart environments. The aim is to identify key areas of application, current trends, data architectures, and ongoing challenges in these fields. To the best of our knowled... Read More about Big data and IoT-based applications in smart environments: A systematic review.

Lightweight edge authentication for software defined networks (2020)
Journal Article
Almaini, A., Al-Dubai, A., Romdhani, I., Schramm, M., & Alsarhan, A. (2021). Lightweight edge authentication for software defined networks. Computing, 103, https://doi.org/10.1007/s00607-020-00835-4

OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While... Read More about Lightweight edge authentication for software defined networks.

Towards the Development of Rapid and Low-Cost Pathogen Detection Systems Using Microfluidic Technology and Optical Image Processing (2020)
Journal Article
Kerrouche, A., Lithgow, J., Muhammad, I., & Romdhani, I. (2020). Towards the Development of Rapid and Low-Cost Pathogen Detection Systems Using Microfluidic Technology and Optical Image Processing. Applied Sciences, 10(7), Article 2527. https://doi.org/10.3390/app10072527

Waterborne pathogens affect all waters globally and proceed to be an ongoing concern. Previous methods for detection of pathogens consist of a high test time and a high sample consumption, but they are very expensive and require specialist operators.... Read More about Towards the Development of Rapid and Low-Cost Pathogen Detection Systems Using Microfluidic Technology and Optical Image Processing.

Trust-aware and Cooperative Routing Protocol for IoT Security (2020)
Journal Article
Djedjig, N., Tandjaoui, D., Medjek, F., & Romdhani, I. (2020). Trust-aware and Cooperative Routing Protocol for IoT Security. Journal of Information Security and Applications, 52, Article 102467. https://doi.org/10.1016/j.jisa.2020.102467

The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to... Read More about Trust-aware and Cooperative Routing Protocol for IoT Security.

Addressing the DAO Insider Attack in RPL’s Internet of Things Networks (2018)
Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Qasem, M., Romdhani, I., & Mackenzie, L. (2019). Addressing the DAO Insider Attack in RPL’s Internet of Things Networks. IEEE Communications Letters, 23(1), 68-71. https://doi.org/10.1109/LCOMM.2018.2878151

In RPL routing protocol, the DAO (Destination Advertisement Object) control messages are announced by the child nodes to their parents to build downward routes. A malicious insider node can exploit this feature to send fake DAOs to its parents period... Read More about Addressing the DAO Insider Attack in RPL’s Internet of Things Networks.

A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT (2018)
Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Romdhani, I., Nasser, Y., & Boukerche, A. (2018). A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT. IEEE Internet of Things Journal, 5(6), 12. https://doi.org/10.1109/JIOT.2018.2862364

In this paper, we introduce Drizzle, a new algorithm for maintaining routing information in the Low-power and Lossy Networks (LLNs). The aim is to address the limitations of the currently standardized routing maintenance (i.e. Trickle algorithm) in s... Read More about A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT.

Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things (2018)
Journal Article
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2018). Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things. International Journal of Sensor Networks, 26(4), 227. https://doi.org/10.1504/ijsnet.2018.090462

E-health applications have emerged as a promising approach to provide unobtrusive and customizable support to elderly and frail people based on their situation and circumstances. However, due to limited resources available in such systems and data pr... Read More about Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things.

Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBANs) (2018)
Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2018). Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBANs). IEEE Transactions on Green Communications and Networking, 2(3), 804-816. https://doi.org/10.1109/tgcn.2018.2813060

Medium Access Control (MAC) protocols based on Time Division Multiple Access (TDMA) can improve the reliability and efficiency of WBAN. However, traditional static TDMA techniques adopted by IEEE 802.15.4 and IEEE 802.15.6 do not sufficiently conside... Read More about Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBANs).

Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence (2017)
Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2017). Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence. ACM computing surveys, 50(1), Article 3. https://doi.org/10.1145/3041956

Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, including the medical field, the entertainment and ambient intelligence areas. T... Read More about Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence.

Password Pattern and Vulnerability Analysis for Web and Mobile Applications (2016)
Journal Article
Li, S., Romdhani, I., & Buchanan, W. (2016). Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006

Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile applications based on conditions of the Shannon entropy, Guessing entropy a... Read More about Password Pattern and Vulnerability Analysis for Web and Mobile Applications.

An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation (2015)
Journal Article
Fang, D., Liu, X., Romdhani, I., Jamshidi, P., & Pahl, C. (2016). An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation. Future Generation Computer Systems, 56, 11-26. https://doi.org/10.1016/j.future.2015.09.025

Cloud computing enables a revolutionary paradigm of consuming ICT services. However, due to the inadequately described service information, users often feel confused while trying to find the optimal services. Although some approaches are proposed to... Read More about An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation.

An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework (2015)
Journal Article
Fang, D., Liu, X., Romdhani, I., & Pahl, C. (2015). An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework. Journal of cloud computing: advances, systems and applications, 4(1), https://doi.org/10.1186/s13677-015-0039-3

Cloud computing offers various computational resources via convenient on-demand service provision. Currently, heterogeneous services and cloud resources are usually utilized and managed through diverse service portals. This significantly limits the e... Read More about An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework.

FH-MAC: A Multi-Channel Hybrid MAC Protocol for Wireless Mesh Networks (2009)
Journal Article
Tandjaoui, D., Doudou, M., & Romdhani, I. (2009). FH-MAC: A Multi-Channel Hybrid MAC Protocol for Wireless Mesh Networks. International Journal of Grid and High Performance Computing, 1(4), 40-56. https://doi.org/10.4018/jghpc.2009070804

In this article, the authors propose a new hybrid MAC protocol named H-MAC for wireless mesh networks. This protocol combines CSMA and TDMA schemes according to the contention level. In addition, it exploits channel diversity and provides a medium ac... Read More about FH-MAC: A Multi-Channel Hybrid MAC Protocol for Wireless Mesh Networks.

IP mobile multicast: Challenges and solutions (2004)
Journal Article
Romdhani, I., Kellil, M., Lach, H., Bouabdallah, A., & Bettahar, H. (2004). IP mobile multicast: Challenges and solutions. Communications Surveys and Tutorials, IEEE Communications Society, 6(1), 18-41. https://doi.org/10.1109/comst.2004.5342232

This article outlines the challenges of IP multicast over Mobile IP. Then it provides a comprehensive overview of existing multicast solutions to handle mobile sources and receivers in both the Mobile IPv4 and the Mobile IPv6 environments. The solut... Read More about IP mobile multicast: Challenges and solutions.