Skip to main content

Research Repository

Advanced Search

All Outputs (7)

A new efficient objective function for routing in Internet of Things paradigm (2016)
Conference Proceeding
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., & Gharibi, W. (2016). A new efficient objective function for routing in Internet of Things paradigm. In 2016 IEEE Conference on Standards for Communications and Networking (CSCN). https://doi.org/10.1109/cscn.2016.7785168

Low Power and Lossy Networks (LLNs) have a crucial role in the Internet of Things (IoT) paradigm. For the IPv6 Routing Protocol for LLNs (RPL), two objective functions (OF) have been standardized so far, namely (Objective Function zero (OF0), and the... Read More about A new efficient objective function for routing in Internet of Things paradigm.

3LS-authenticate: an e-commerce challenge-response mobile application. (2016)
Presentation / Conference
Molla, R., Romdhani, I., & Buchanan, B. (2016, November). 3LS-authenticate: an e-commerce challenge-response mobile application. Paper presented at 13th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2016

The rapid growth of e-commerce has been associated with a number of security concerns, which challenge its continual success. In view of this, an investigative study determining the most secure and convenient solution to protect online clients has be... Read More about 3LS-authenticate: an e-commerce challenge-response mobile application..

Weight Driven Cluster Head Rotation for Wireless Sensor Networks (2016)
Conference Proceeding
Eshaftri, M. A., Al-Dubai, A. Y., Romdhani, I., & Essa, A. (2016). Weight Driven Cluster Head Rotation for Wireless Sensor Networks. In B. Abdulrazak, E. Pardede, M. Steinbauer, I. Khalil, & G. Anderst-Kotsis (Eds.), Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media MoMM'16 (327-331). https://doi.org/10.1145/3007120.3007170

Energy efficiency is one of the major issues in Wireless Sensor Networks (WSNs), due to the limited power and processing capabilities of the Sensor Nodes (SNs). The clustering techniques proved to be the effective solution to improve the energy effic... Read More about Weight Driven Cluster Head Rotation for Wireless Sensor Networks.

Cooja Simulator Manual (2016)
Report
Thomson, C., Romdhani, I., Al-Dubai, A., Qasem, M., Ghaleb, B., & Wadhaj, I. (2016). Cooja Simulator Manual. Edinburgh: Edinburgh Napier University

While Cooja has been proven to be an ideal tool for the simulation of RPL in WSNs, there are challenges involved in its use, particularly in regard to a lack of documentation. The Contiki website provides an image of Instant Contiki which can then be... Read More about Cooja Simulator Manual.

Password Pattern and Vulnerability Analysis for Web and Mobile Applications (2016)
Journal Article
Li, S., Romdhani, I., & Buchanan, W. (2016). Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006

Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile applications based on conditions of the Shannon entropy, Guessing entropy a... Read More about Password Pattern and Vulnerability Analysis for Web and Mobile Applications.

Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things (2016)
Conference Proceeding
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016). Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things. In 5th IEEE International Conference on Mobile Services

Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirements of low-power and low-processing devices. To address this issue, we com... Read More about Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.

A new distributed MIKEY mode to secure e-health applications. (2016)
Conference Proceeding
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2016). A new distributed MIKEY mode to secure e-health applications. In M. Ramachandran, G. Wills, R. Walters, V. Méndez Muñoz, & V. Chang (Eds.), Proceedings of the International Conference on Internet of Things and Big Data (88-95). https://doi.org/10.5220/0005945300880095

Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing standard based protocols. Among these protocols, MIKEY (Multimedia Interne... Read More about A new distributed MIKEY mode to secure e-health applications..