Skip to main content

Research Repository

Advanced Search

Outputs (95)

Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution (2023)
Conference Proceeding
Kachale, T., Demeke, W., Chrysoulas, C., & Romdhani, I. (2023). Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution. In P. Kommers, I. Arnedillo Sánchez, & P. Isaías (Eds.), PROCEEDINGS OF THE 16 th IADIS INTERNATIONAL CONFERENCE INFORMATION SYSTEMS 2023 (21-28)

This article is a report on the lessons learned when conducting an interpretive case study in a developing country. From the literature review, it was apparent that there are few reported lessons from pilot studies about strategic alignment in higher... Read More about Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution.

Resolving the Decreased Rank Attack in RPL’s IoT Networks (2023)
Conference Proceeding
Ghaleb, B., Al-Duba, A., Hussain, A., Romdhani, I., & Jaroucheh, Z. (2023). Resolving the Decreased Rank Attack in RPL’s IoT Networks. In 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT) (65-68). https://doi.org/10.1109/DCOSS-IoT58021.2023.00018

The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core... Read More about Resolving the Decreased Rank Attack in RPL’s IoT Networks.

Blockchain for Cybersecurity in Cyber-Physical Systems (2023)
Book
Maleh, Y., Alazab, M., & Romdhani, I. (Eds.). (2023). Blockchain for Cybersecurity in Cyber-Physical Systems. Cham: Springer. https://doi.org/10.1007/978-3-031-25506-9

This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems. It presents crucial issues in this field and provides a sample of recent advances and insights into the research pr... Read More about Blockchain for Cybersecurity in Cyber-Physical Systems.

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence (2022)
Book
Maleh, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.). (2022). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. Gistrup, Denmark: River Publishers

In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for single users and businesses since even a single attack can result in compromise... Read More about Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence.

Ontology-Based Linked Data to Support Decision Making within Universities (2022)
Journal Article
Ashour, G., Al-Dubai, A., Romdhani, I., & Alghazzawi, D. (2022). Ontology-Based Linked Data to Support Decision Making within Universities. Mathematics, 10(17), Article 3148. https://doi.org/10.3390/math10173148

In recent years, educational institutions worked hard to automate their work using more trending technologies that prove the success in supporting decision-making processes. Most the decisions in educational institutions rely on rating the academic r... Read More about Ontology-Based Linked Data to Support Decision Making within Universities.

An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university (2022)
Conference Proceeding
Kachale, T., Demeke, W., Chrysoulas, C., & Romdhani, I. (in press). An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university. In Information Systems and Technologies: WorldCIST 2023 Volume 1

This study draws attention to less studied areas of middle management role in business strategy formulation, information strategy formulation, and their alignment in developing countries. It was conducted as a case study at a public university in Mal... Read More about An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university.

Multicast DIS attack mitigation in RPL-based IoT-LLNs (2021)
Journal Article
Medjek, F., Tandjaoui, D., Djedjig, N., & Romdhani, I. (2021). Multicast DIS attack mitigation in RPL-based IoT-LLNs. Journal of Information Security and Applications, 61, Article 102939. https://doi.org/10.1016/j.jisa.2021.102939

The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was standardised by the IETF ROLL Working Group to address the routing issues in the Internet of Things (IoT) Low-Power and Lossy Networks (LLNs). RPL builds and maintains a Destination... Read More about Multicast DIS attack mitigation in RPL-based IoT-LLNs.

Artificial Intelligence and Blockchain for Future Cybersecurity Applications (2021)
Book
Maleh, Y., Baddi, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.). (2021). Artificial Intelligence and Blockchain for Future Cybersecurity Applications. Cham: Springer. https://doi.org/10.1007/978-3-030-74575-2

Presents the state-of-the-art and the latest discoveries in the field of Artificial Intelligence and Blockchain techniques and methods for future cybersecurity applications Proposes new models, practical solutions and technological advances related... Read More about Artificial Intelligence and Blockchain for Future Cybersecurity Applications.

Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things (2021)
Journal Article
Medjek, F., Tandjaoui, D., Djedjig, N., & Romdhani, I. (2021). Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things. International Journal of Critical Infrastructure Protection, 34, Article 100436. https://doi.org/10.1016/j.ijcip.2021.100436

Internet of Things (IoT) has emerged as a key component of all advanced critical infrastructures. However, with the challenging nature of IoT, new security breaches have been introduced, especially against the Routing Protocol for Low-power and Lossy... Read More about Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things.

Ontology-based Course Teacher Assignment within Universities (2020)
Journal Article
Ashour, G., Al-Dubai, A., & Romdhani, I. (2020). Ontology-based Course Teacher Assignment within Universities. International Journal of Advanced Computer Science and Applications, 11(7), https://doi.org/10.14569/ijacsa.2020.0110787

Educational institutions suffer from the enormous amount of data that keeps growing continuously. These data are usually scattered and unorganised, and it comes from different resources with different formats. Besides, modernization vision within the... Read More about Ontology-based Course Teacher Assignment within Universities.

Big data and IoT-based applications in smart environments: A systematic review (2020)
Journal Article
Hajjaji, Y., Boulila, W., Farah, I. R., Romdhani, I., & Hussain, A. (2021). Big data and IoT-based applications in smart environments: A systematic review. Computer Science Review, 39, Article 100318. https://doi.org/10.1016/j.cosrev.2020.100318

This paper reviews big data and Internet of Things (IoT)-based applications in smart environments. The aim is to identify key areas of application, current trends, data architectures, and ongoing challenges in these fields. To the best of our knowled... Read More about Big data and IoT-based applications in smart environments: A systematic review.

Lightweight edge authentication for software defined networks (2020)
Journal Article
Almaini, A., Al-Dubai, A., Romdhani, I., Schramm, M., & Alsarhan, A. (2021). Lightweight edge authentication for software defined networks. Computing, 103, https://doi.org/10.1007/s00607-020-00835-4

OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While... Read More about Lightweight edge authentication for software defined networks.

An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University (2020)
Conference Proceeding
Ashour, G., Al-Dubai, A., Romdhani, I., & Aljohani, N. (2020). An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University. In 2020 International Conference Engineering Technologies and Computer Science (EnT). https://doi.org/10.1109/ent48576.2020.00030

Educational data is growing continuously. This huge amount of data that is scattered and come from different resources with different formats usually is noisy, duplicated, inconsistent, and unorganized. These data can be more efficient and usable whe... Read More about An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University.

Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications (2020)
Book
Maleh, Y., Shojaafar, M., Alazab, M., & Romdhani, I. (Eds.). (2020). Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. CRC Press

Blockchain Technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction... Read More about Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications.

Towards the Development of Rapid and Low-Cost Pathogen Detection Systems Using Microfluidic Technology and Optical Image Processing (2020)
Journal Article
Kerrouche, A., Lithgow, J., Muhammad, I., & Romdhani, I. (2020). Towards the Development of Rapid and Low-Cost Pathogen Detection Systems Using Microfluidic Technology and Optical Image Processing. Applied Sciences, 10(7), Article 2527. https://doi.org/10.3390/app10072527

Waterborne pathogens affect all waters globally and proceed to be an ongoing concern. Previous methods for detection of pathogens consist of a high test time and a high sample consumption, but they are very expensive and require specialist operators.... Read More about Towards the Development of Rapid and Low-Cost Pathogen Detection Systems Using Microfluidic Technology and Optical Image Processing.

Trust-aware and Cooperative Routing Protocol for IoT Security (2020)
Journal Article
Djedjig, N., Tandjaoui, D., Medjek, F., & Romdhani, I. (2020). Trust-aware and Cooperative Routing Protocol for IoT Security. Journal of Information Security and Applications, 52, Article 102467. https://doi.org/10.1016/j.jisa.2020.102467

The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to... Read More about Trust-aware and Cooperative Routing Protocol for IoT Security.

Delegation of Authentication to the Data Plane in Software-Defined Networks (2020)
Conference Proceeding
Almaini, A., Al-Dubai, A., Romdhani, I., & Schramm, M. (2020). Delegation of Authentication to the Data Plane in Software-Defined Networks. In 2019 IEEE International Conferences on Ubiquitous Computing & Communications (IUCC) and Data Science and Computational Intelligence (DSCI) and Smart Computing, Networking and Services (SmartCNS) (58-65). https://doi.org/10.1109/iucc/dsci/smartcns.2019.00038

OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While... Read More about Delegation of Authentication to the Data Plane in Software-Defined Networks.

BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN (2020)
Conference Proceeding
Boukria, S., Guerroumi, M., & Romdhani, I. (2020). BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN. In 2019 IEEE Symposium on Computers and Communications (ISCC) (1034-1039). https://doi.org/10.1109/ISCC47284.2019.8969780

Software Defined Networking (SDN) technology increases the evolution of Internet and network development. SDN, with its logical centralization of controllers and global network overview changes the network's characteristics, on term of flexibility, a... Read More about BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN.

Cross-Layer Multipath Multichannel MAC protocol for MANETs (2018)
Conference Proceeding
Mirza, N., Taylor, H., Abdelshafy, M., King, P., Romdhani, I., & Alghamdi, A. (2018). Cross-Layer Multipath Multichannel MAC protocol for MANETs. In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC). https://doi.org/10.1109/ISNCC.2018.8530886

Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure is detected. However, depending on a stale route to recover from a broken li... Read More about Cross-Layer Multipath Multichannel MAC protocol for MANETs.

Crowdfunding Can Serve as a Pathway to Higher Education (2018)
Book Chapter
Romdhani, I., El Youssi, A., Al Mennai, M., Babah, E., & Yahya, R. (2018). Crowdfunding Can Serve as a Pathway to Higher Education. In M. Mohieldin, & D. Petkoski (Eds.), Financing Sustainable Development: Ideas for Action 2018 (43-49)

The Al-Derb platform provides a way for individual and group funding (crowdfunding) to help young people obtain grants for high-quality online education and training courses offered by universities and training centers. The availability of high-quali... Read More about Crowdfunding Can Serve as a Pathway to Higher Education.

Addressing the DAO Insider Attack in RPL’s Internet of Things Networks (2018)
Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Qasem, M., Romdhani, I., & Mackenzie, L. (2019). Addressing the DAO Insider Attack in RPL’s Internet of Things Networks. IEEE Communications Letters, 23(1), 68-71. https://doi.org/10.1109/LCOMM.2018.2878151

In RPL routing protocol, the DAO (Destination Advertisement Object) control messages are announced by the child nodes to their parents to build downward routes. A malicious insider node can exploit this feature to send fake DAOs to its parents period... Read More about Addressing the DAO Insider Attack in RPL’s Internet of Things Networks.

Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings (2018)
Conference Proceeding
(2018). Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings. In I. Romdhani, L. Shu, H. Takahiro, Z. Zhou, T. Gordon, & D. Zeng (Eds.), Collaborative Computing: Networking, Applications and Worksharing. https://doi.org/10.1007/978-3-030-00916-8

This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2017, held in Edinburgh, UK, in December 2017. The 65 papers presente... Read More about Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings.

A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT (2018)
Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Romdhani, I., Nasser, Y., & Boukerche, A. (2018). A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT. IEEE Internet of Things Journal, 5(6), 12. https://doi.org/10.1109/JIOT.2018.2862364

In this paper, we introduce Drizzle, a new algorithm for maintaining routing information in the Low-power and Lossy Networks (LLNs). The aim is to address the limitations of the currently standardized routing maintenance (i.e. Trickle algorithm) in s... Read More about A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT.

Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks (2018)
Presentation / Conference
Ali, A. E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2018, June). Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks. Paper presented at The 16th IEEE International Conference on Smart City (IEEE SmartCity-2018)

In Wireless Sensor Networks, clustering sensor nodes into disjoint groups is widely used to achieve load balance and increase network lifetime. In particular, traditional unequal clustering approaches where small clusters located close to the base st... Read More about Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks.

Drizzle Algorithm (2018)
Report
Ghaleb, B., Al-Dubai, A., Romdhani, I., & Qasem, M. (2018). Drizzle Algorithm. USA: IETF

Trickle algorithm used in RPL routing protocol suffers from some issues related to power, network convergence time and overhead and load-distribution. To optimize this algorithm for Low-power and Lossy Networks (LLNs), a new algorithm called Dr... Read More about Drizzle Algorithm.

Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things (2018)
Journal Article
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2018). Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things. International Journal of Sensor Networks, 26(4), 227. https://doi.org/10.1504/ijsnet.2018.090462

E-health applications have emerged as a promising approach to provide unobtrusive and customizable support to elderly and frail people based on their situation and circumstances. However, due to limited resources available in such systems and data pr... Read More about Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things.

Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBANs) (2018)
Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2018). Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBANs). IEEE Transactions on Green Communications and Networking, 2(3), 804-816. https://doi.org/10.1109/tgcn.2018.2813060

Medium Access Control (MAC) protocols based on Time Division Multiple Access (TDMA) can improve the reliability and efficiency of WBAN. However, traditional static TDMA techniques adopted by IEEE 802.15.4 and IEEE 802.15.6 do not sufficiently conside... Read More about Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBANs).

Load Balancing Objective Function in RPL draft-qasem-roll-rpl-load-balancing-01 (2018)
Report
Qasem, M., Al-Dubai, A., Romdhani, I., & Ghaleb, B. (2018). Load Balancing Objective Function in RPL draft-qasem-roll-rpl-load-balancing-01. USA: IETF

This document proposes an extended Objective Function(OF) that balances the number of children nodes of the parent nodes to avoid the overloading problem and ensure node lifetime maximization in the IPv6 Routing Protocol for Low-Power and Lossy Net... Read More about Load Balancing Objective Function in RPL draft-qasem-roll-rpl-load-balancing-01.

A Trust-based Intrusion Detection System for Mobile RPL Based Networks (2018)
Conference Proceeding
Faiza, M., Tandjaoui, D., Romdhani, I., & Nabil, D. (2018). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017). https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.113

Successful deployment of Low power and Lossy Networks (LLNs) requires self-organising, self-configuring, security, and mobility support. However, these characteristics can be exploited to perform security attacks against the Routing Protocol for Low-... Read More about A Trust-based Intrusion Detection System for Mobile RPL Based Networks.

A new Zigbee-based device for measuring visual reaction time in sport activities (2018)
Conference Proceeding
Ali, B. B., Dugas, É., Naceur, A., & Romdhani, I. (2018). A new Zigbee-based device for measuring visual reaction time in sport activities. In 2017 International Conference on Engineering & MIS (ICEMIS). https://doi.org/10.1109/icemis.2017.8273005

There is a growing demand for smart tools and devices that measure visual reaction time during sports and physical activities in outdoor environments. However, one of the major problems is the need to maintain an on-time 1 pulse per second (pps) refe... Read More about A new Zigbee-based device for measuring visual reaction time in sport activities.

A new dynamic weight clustering algorithm for wireless sensor networks (2017)
Conference Proceeding
Essa, A., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2017). A new dynamic weight clustering algorithm for wireless sensor networks. In S. Yang, J. Gao, Y. Zhang, K. Yang, V. C. M. Leung, & J. Hu (Eds.), Smart Grid Inspired Future Technologies: First International Conference, Liverpool, UK, May 19-20, 2016 SmartGIFT 2016 (195-203)

Since sensor nodes have limited energy resources, prolonging network lifetime and improving scalability are essential elements in energy-efficient Wireless Sensor Networks (WSNs). Most existing approaches consider the residual energy of a single node... Read More about A new dynamic weight clustering algorithm for wireless sensor networks.

Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks (2017)
Conference Proceeding
Mirza, N. S., King, P. J. B., Romdhani, I., Abdelshafy, M. A., & Alghamdi, A. A. (2017). Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks. In Wireless and Mobile Computing, Networking and Communications (WiMob). https://doi.org/10.1109/wimob.2017.8115854

The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads or delays to repair the broken link is a desirable goal for any routing pr... Read More about Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks.

Load Balancing Objective Function in RPL (Draft 2) (2017)
Report
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., Hou, J., & Jadhav, R. A. (2017). Load Balancing Objective Function in RPL (Draft 2). USA: IETF

This document proposes an extended Objective Function(OF) that balances the number of child nodes of the parent nodes to avoid the overloading problem and ensure node lifetime maximization in the IPv6 Routing Protocol for Low-Power and Lossy Ne... Read More about Load Balancing Objective Function in RPL (Draft 2).

A New Weight based Rotating Clustering Scheme for WSNs (2017)
Conference Proceeding
Essa, A., Al-Dubai, A. Y., Romdhani, I., & Esriaftri, M. A. (2017). A New Weight based Rotating Clustering Scheme for WSNs. In 2017 International Symposium on Networks, Computers and Communications (ISNCC). https://doi.org/10.1109/ISNCC.2017.8072000

Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely recommended approaches to sustaining a network throughout its lifetime. Des... Read More about A New Weight based Rotating Clustering Scheme for WSNs.

Performance Evaluation of RPL Protocol under Mobile Sybil Attacks (2017)
Conference Proceeding
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017). Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESS. https://doi.org/10.1109/trustcom/bigdatase/icess.2017.351

In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of Things (IoT) applications. In this paper we implemented and evaluated the... Read More about Performance Evaluation of RPL Protocol under Mobile Sybil Attacks.

Load Balancing Objective Function in RPL (2017)
Other
Qasam, M., Al-Dubai, A., Romdhani, I., & Ghaleb, B. (2017). Load Balancing Objective Function in RPL. [RFC Internet Draft]

This document proposes an extended Objective Function(OF) that balances the number of children nodes of the parent nodes to avoid the overloading problem and ensure node lifetime maximization in the IPv6 Routing Protocol for Low-Power and Lossy Netwo... Read More about Load Balancing Objective Function in RPL.

Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT (2017)
Conference Proceeding
Ghaleb, B., Al-Dubai, A., Romdhani, I., Nasser, Y., & Boukerche, A. (2017). Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC) (1-6). https://doi.org/10.1109/icc.2017.7996819

Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopted for routing information maintenance in such networks. This algorithm is o... Read More about Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT.

Trust-Based Defence Model Against MAC Unfairness Attacks for IoT (2017)
Conference Proceeding
Djedjig, N., Tandjaoui, D., Romdhani, I., & Medjek, F. (2017). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In C. Westphall, K. El-Khatib, D. Krstić, & H. Menouar (Eds.), Proceedings of the Thirteenth International Conference on Wireless and Mobile Communications

The vulnerability of IoT networks makes channel access security a serious problem. The IEEE 802.15.4 MAC (Media Access Control) layer faces the risk of attacks from malicious nodes which attempts to get a dominating position and hold unfair advantage... Read More about Trust-Based Defence Model Against MAC Unfairness Attacks for IoT.

Performance evaluation of RPL metrics in environments with strained transmission ranges. (2017)
Conference Proceeding
Thomson, C., Wadhaj, I., Romdhani, I., & Al-Dubai, A. (2017). Performance evaluation of RPL metrics in environments with strained transmission ranges. In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA). https://doi.org/10.1109/aiccsa.2016.7945687

An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consistent approach taken of optimal node distribution. This in order to best evalua... Read More about Performance evaluation of RPL metrics in environments with strained transmission ranges..

New trust metric for the RPL routing protocol (2017)
Conference Proceeding
Romdhani, I., Djedjig, N., Medjek, F., & Tandjaoui, D. (2017). New trust metric for the RPL routing protocol. In 2017 8th International Conference on Information and Communication Systems (ICICS),. https://doi.org/10.1109/iacs.2017.7921993

Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. In this paper, we propose a new security scheme for the Internet of things... Read More about New trust metric for the RPL routing protocol.

Reliability and energy efficiency enhancement in wireless body area networks for e-health (2017)
Conference Proceeding
Salayma, M., Al-Dubai, A., & Romdhani, I. (2017). Reliability and energy efficiency enhancement in wireless body area networks for e-health. In 2016 19th Conference of Open Innovations Association (FRUCT). https://doi.org/10.23919/FRUCT.2016.7892202

Wireless Body Area Network (WBAN) is a technology that revolutionises our understanding of the future digitised healthcare systems. WBAN has unique challenges and features compared to other wireless sensor networks. In addition to battery power consu... Read More about Reliability and energy efficiency enhancement in wireless body area networks for e-health.

Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence (2017)
Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2017). Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence. ACM computing surveys, 50(1), Article 3. https://doi.org/10.1145/3041956

Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, including the medical field, the entertainment and ambient intelligence areas. T... Read More about Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence.

Securing the Internet of Things (2017)
Book
Romdhani, I. (2017). S. Li, & L. Da Xu (Eds.), Securing the Internet of Things. Elsevier

Key Features Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures Explores how the threats in IoT are different from traditional ad hoc or infrastructural network... Read More about Securing the Internet of Things.

BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. (2017)
Book Chapter
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2017). BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. In M. Grzenda, J. Furtak, J. Legierski, & A. I. Awad (Eds.), Advances in Networking Systems Architectures, Security, and Applications (317-335). CHAM: Springer

The IEEE 802.15.4 standard supports both physical and Media Access Con-trol (MAC) layers of low rate Wireless Sensor Network (WSNs). However, this stand-ard considers only the ideal linear power consumption, omitting the fact that the diffu-sion prin... Read More about BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC..

A new efficient objective function for routing in Internet of Things paradigm (2016)
Conference Proceeding
Qasem, M., Al-Dubai, A., Romdhani, I., Ghaleb, B., & Gharibi, W. (2016). A new efficient objective function for routing in Internet of Things paradigm. In 2016 IEEE Conference on Standards for Communications and Networking (CSCN). https://doi.org/10.1109/cscn.2016.7785168

Low Power and Lossy Networks (LLNs) have a crucial role in the Internet of Things (IoT) paradigm. For the IPv6 Routing Protocol for LLNs (RPL), two objective functions (OF) have been standardized so far, namely (Objective Function zero (OF0), and the... Read More about A new efficient objective function for routing in Internet of Things paradigm.

3LS-authenticate: an e-commerce challenge-response mobile application. (2016)
Presentation / Conference
Molla, R., Romdhani, I., & Buchanan, B. (2016, November). 3LS-authenticate: an e-commerce challenge-response mobile application. Paper presented at 13th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2016

The rapid growth of e-commerce has been associated with a number of security concerns, which challenge its continual success. In view of this, an investigative study determining the most secure and convenient solution to protect online clients has be... Read More about 3LS-authenticate: an e-commerce challenge-response mobile application..

Weight Driven Cluster Head Rotation for Wireless Sensor Networks (2016)
Conference Proceeding
Eshaftri, M. A., Al-Dubai, A. Y., Romdhani, I., & Essa, A. (2016). Weight Driven Cluster Head Rotation for Wireless Sensor Networks. In B. Abdulrazak, E. Pardede, M. Steinbauer, I. Khalil, & G. Anderst-Kotsis (Eds.), Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media MoMM'16 (327-331). https://doi.org/10.1145/3007120.3007170

Energy efficiency is one of the major issues in Wireless Sensor Networks (WSNs), due to the limited power and processing capabilities of the Sensor Nodes (SNs). The clustering techniques proved to be the effective solution to improve the energy effic... Read More about Weight Driven Cluster Head Rotation for Wireless Sensor Networks.

Cooja Simulator Manual (2016)
Report
Thomson, C., Romdhani, I., Al-Dubai, A., Qasem, M., Ghaleb, B., & Wadhaj, I. (2016). Cooja Simulator Manual. Edinburgh: Edinburgh Napier University

While Cooja has been proven to be an ideal tool for the simulation of RPL in WSNs, there are challenges involved in its use, particularly in regard to a lack of documentation. The Contiki website provides an image of Instant Contiki which can then be... Read More about Cooja Simulator Manual.

Password Pattern and Vulnerability Analysis for Web and Mobile Applications (2016)
Journal Article
Li, S., Romdhani, I., & Buchanan, W. (2016). Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006

Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile applications based on conditions of the Shannon entropy, Guessing entropy a... Read More about Password Pattern and Vulnerability Analysis for Web and Mobile Applications.

Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things (2016)
Conference Proceeding
Abdmeziem, R., Tandjaoui, D., & Romdhani, I. (2016). Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things. In 5th IEEE International Conference on Mobile Services

Multimedia Internet KEYing protocol (MIKEY) aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirements of low-power and low-processing devices. To address this issue, we com... Read More about Distributed and compressed MIKEY mode to secure end-to-end communications in the Internet of things.

A new distributed MIKEY mode to secure e-health applications. (2016)
Conference Proceeding
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2016). A new distributed MIKEY mode to secure e-health applications. In M. Ramachandran, G. Wills, R. Walters, V. Méndez Muñoz, & V. Chang (Eds.), Proceedings of the International Conference on Internet of Things and Big Data (88-95). https://doi.org/10.5220/0005945300880095

Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing standard based protocols. Among these protocols, MIKEY (Multimedia Interne... Read More about A new distributed MIKEY mode to secure e-health applications..

A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK) (2015)
Conference Proceeding
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015). A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM) (1109-1117). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.166

It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and mission-critical sensing tasks, securing multicast applications is therefo... Read More about A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK).

A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things (2015)
Conference Proceeding
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015). A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. In I. C. Society, & I. C. Society (Eds.), 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (1118-1122). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.167

Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However, a regular update process causes extra signaling overhead and drains the n... Read More about A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things.

Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks (2015)
Conference Proceeding
Wadhaj, I., Kristof, I., Romdhani, I., & Al-Dubai, A. (2015). Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks. In Proceedings of the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015) (1600-1605). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.241

Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how a routing protocol for low-power and lossy-networks such as (RPL) would per... Read More about Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks.

Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable (2015)
Conference Proceeding
Krstie, D., Romdhani, I., Yassein, M. M. B., Minić, S., Petković, G., & Milacic, P. (2015). Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (1620-1625). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.244

In this paper, ratio of product of two k-μ random variables and Nakagami-m random variable is analyzed. Statistical characteristics of ratio of product of two k-μ random variables and Nakagami-m random variable can be applied in performance analysis... Read More about Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable.

Mobility And Energy Extensions For The IEEE 802.15.4 Standard (2015)
Conference Proceeding
Romdhani, I., Al-Dubai, A. Y., & Guibene, W. (2015). Mobility And Energy Extensions For The IEEE 802.15.4 Standard. In L. Luke Chen, M. Steinbauer, I. Khalil, & G. Anderst-Kotsis (Eds.), Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia (318-321). https://doi.org/10.1145/2837126.2837167

The IEEE 802.15.4 standard is designed for low-power and low-rate wireless Personal Area Networks. Although energy is a key parameter in shaping the communication and interaction methods of wireless sensor nodes, the specification of the MAC layer do... Read More about Mobility And Energy Extensions For The IEEE 802.15.4 Standard.

An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks (2015)
Conference Proceeding
Eshaftri, M. A., Al-Dubai, A. Y., Romdhani, I., & Yassein, M. B. (2015). An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks. In L. Chen, M. Steinbaur, I. Khalil, & G. Anderst-Kotsis (Eds.), MoMM 2015 Proceedings of The 13th International Conference on Advances in Mobile Computing and Multimedia (189-194). https://doi.org/10.1145/2837126.2837149

In Wireless Sensor Networks (WSNs), clustering techniques are among the effective solutions to reduce energy consumption and prolong the network lifetime. During the iterative re-clustering process, extra energy and time are consumed especially at th... Read More about An Efficient Dynamic Load-balancing Aware Protocol for Wireless Sensor Networks.

A New Energy Efficient Cluster based Protocol for Wireless Sensor Networks (2015)
Conference Proceeding
Eshaftri, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015). A New Energy Efficient Cluster based Protocol for Wireless Sensor Networks. In I. C. Society (Ed.), 2015 Federated Conference on Computer Science and Information Systems (FedCSIS) (1209-1214). https://doi.org/10.15439/2015F193

In Wireless Sensor Networks (WSNs), clustering techniques are usually used as a key effective solution to reduce energy consumption and prolong the network lifetime. Despite many works on clustering in WSNs, this issue is still, however, in its infan... Read More about A New Energy Efficient Cluster based Protocol for Wireless Sensor Networks.

An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation (2015)
Journal Article
Fang, D., Liu, X., Romdhani, I., Jamshidi, P., & Pahl, C. (2016). An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation. Future Generation Computer Systems, 56, 11-26. https://doi.org/10.1016/j.future.2015.09.025

Cloud computing enables a revolutionary paradigm of consuming ICT services. However, due to the inadequately described service information, users often feel confused while trying to find the optimal services. Although some approaches are proposed to... Read More about An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation.

Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach (2015)
Conference Proceeding
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015). Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. In M. Ganzha, L. Maciaszek, & M. Paprzycki (Eds.), Proceedings of the 2015 Federated Conference on Computer Science and Information Systems (1267-1272). https://doi.org/10.15439/2015F118

In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the design of WSN energy efficient algorithms and standards. The standard IEEE 80... Read More about Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach.

ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things (2015)
Conference Proceeding
Qasem, M., Al-Dubai, A., Imed, R., & Yassien, M. B. (2015). ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things. In ICEMIS '15 Proceedings of the The International Conference on Engineering & MIS 2015. https://doi.org/10.1145/2832987.2833058

Energy is a precious resource in Internet of Things (IoT) especially with battery operated nodes, the overhead that consumes the battery power of the sensor nodes is a fundamental problem. This overhead is mainly caused by the frequent update message... Read More about ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things.

Architecting the Internet of Things: State of the Art (2015)
Book Chapter
Abdmeziem, M. R., Romdhani, I., & Tandjaoui, D. (2016). Architecting the Internet of Things: State of the Art. In A. Koubaa, & E. Shakshuki (Eds.), Robots and Sensor Clouds; Studies in Systems, Decision and Control (55-75). Springer. https://doi.org/10.1007/978-3-319-22168-7_3

Internet of things (IoT) constitutes one of the most important technological development in the last decade. It has the potential to deeply affect our life style. However, its success relies greatly on a well-defined architecture that will provide sc... Read More about Architecting the Internet of Things: State of the Art.

An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework (2015)
Journal Article
Fang, D., Liu, X., Romdhani, I., & Pahl, C. (2015). An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework. Journal of cloud computing: advances, systems and applications, 4(1), https://doi.org/10.1186/s13677-015-0039-3

Cloud computing offers various computational resources via convenient on-demand service provision. Currently, heterogeneous services and cloud resources are usually utilized and managed through diverse service portals. This significantly limits the e... Read More about An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework.

A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval. (2015)
Conference Proceeding
Fang, D., Liu, X., & Romdhani, I. (2015). A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval. In W. Zimmerman, Y. W. Lee, & C. Reich (Eds.), Cloud Computing 2014: the Fifth International Conference on Cloud Computing, Grids and Virtualization (6-11)

As cloud services propagate along with the rapid development of cloud computing, issues raised in service selection and retrieval processes become increasingly critical. While many approaches are proposed on the specification and discovery of cloud s... Read More about A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval..

Reliable Hierarchical Cluster Routing Protocol for Wireless Sensor Networks. (2014)
Presentation / Conference
Eshaftri, M., Essa, A., Qasem, M., Romdhani, I., & Al-Dubai, A. (2014, June). Reliable Hierarchical Cluster Routing Protocol for Wireless Sensor Networks. Paper presented at International Conference on Networking, Distributed Systems and Applications : INDS 2014, Bejaia, Algeria

Wireless sensor networks (WSNs) have recently become an integral part of a wide range of systems such as surveillance, target tracking, security and health management systems. WSNs deploy a large number of sensor nodes that cooperate to... Read More about Reliable Hierarchical Cluster Routing Protocol for Wireless Sensor Networks..

Mobile User Authentication System for E-commerce Applications. (2014)
Presentation / Conference
Molla, R., Romdhani, I., Buchanan, W. J., & Fadel, E. Y. (2014, June). Mobile User Authentication System for E-commerce Applications. Paper presented at International Conference on Advanced Networking, Distributed Systems and Applications 2014

E-commerce applications provide on-line clients and merchants with a quick and convenient way to exchange goods and services. However, the deployment of these applications is still facing many problems such as security threats; and on-line attacks. T... Read More about Mobile User Authentication System for E-commerce Applications..

Many-to-Many embedded multicast addressing and access control method. (2012)
Patent
Romdhani, I. (2012). Many-to-Many embedded multicast addressing and access control method

A new addressing scheme for multicast IP with an extended scope field to include access rights. A new addressing scheme for multicast communications is disclosed. A new extended scope field is used which embeds a plurality of hierarchical scopes and... Read More about Many-to-Many embedded multicast addressing and access control method..

Towards OWL 2 Natively Supported Fuzzy Cloud Ontology (2012)
Conference Proceeding
Fang, D., Liu, X., Romdhani, I., & Zhao, H. (2012). Towards OWL 2 Natively Supported Fuzzy Cloud Ontology. In 6th IEEE International Workshop Quality-Oriented Reuse of Software (IEEE QUORS’12) (328-333). https://doi.org/10.1109/compsacw.2012.66

Cloud Computing introduces a revolutionary paradigm of computing to Service Oriented Architecture (SOA), by provisioning various types of computational resources and applications as on-demand services. While presenting cloud services semantically usi... Read More about Towards OWL 2 Natively Supported Fuzzy Cloud Ontology.

Experimental investigation of link layer adaptation in IEEE 802.11n WLANs (2012)
Conference Proceeding
Al-Adhami, M., Al-Dubai, A. Y., & Romdhani, I. (2012). Experimental investigation of link layer adaptation in IEEE 802.11n WLANs. In 11th IEEE International Wireless Telecommunications Symposium (1-7). https://doi.org/10.1109/wts.2012.6266144

Due to its low cost wireless communication methodology and improvements in both its physical (PHY) and MAC (Link) layers, the IEEE 802.11n wireless LAN (WLAN) technology has been adopted widely. However, fairness of current 802.11n rate adaptation (R... Read More about Experimental investigation of link layer adaptation in IEEE 802.11n WLANs.

Student project performance management system for effective final year and dissertation projects supervision. (2011)
Presentation / Conference
Romdhani, I., Tawse, M., & Habibullah, S. (2011, November). Student project performance management system for effective final year and dissertation projects supervision. Paper presented at London International Conference on Education LICE-2011

This paper presents the features of a new integrated and collaborative online supervision system for final year and dissertation projects. The system is currently under development and it aims to ease the supervision process, federate the tasks of al... Read More about Student project performance management system for effective final year and dissertation projects supervision..

Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks (2010)
Conference Proceeding
Zhao, L., Al-Dubai, A. Y., & Romdhani, I. (2010). Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks. In 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), (336-342). https://doi.org/10.1109/cit.2010.500

Wireless Mesh Networking (WMN) emerges as a new technology to reshape the broadband industry towards a more efficient and cost effective connectivity. The WMN has been the ideal technology for the next generation wireless community networks that offe... Read More about Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks.

Security and Routing Scoped IP Multicast Addresses (2009)
Conference Proceeding
Romdhani, I., Al-Dubai, A., & Kellil, M. (2009). Security and Routing Scoped IP Multicast Addresses. In International Conference on Parallel Processing Workshops, 2009. ICPPW '09 (228-235). https://doi.org/10.1109/icppw.2009.81

IP multicast is an efficient and scalable network layer delivering method for multimedia content to a large number of receivers across the Internet. It saves the network bandwidth and optimizes the processing overhead of the source. However, current... Read More about Security and Routing Scoped IP Multicast Addresses.

FH-MAC: A Multi-Channel Hybrid MAC Protocol for Wireless Mesh Networks (2009)
Journal Article
Tandjaoui, D., Doudou, M., & Romdhani, I. (2009). FH-MAC: A Multi-Channel Hybrid MAC Protocol for Wireless Mesh Networks. International Journal of Grid and High Performance Computing, 1(4), 40-56. https://doi.org/10.4018/jghpc.2009070804

In this article, the authors propose a new hybrid MAC protocol named H-MAC for wireless mesh networks. This protocol combines CSMA and TDMA schemes according to the contention level. In addition, it exploits channel diversity and provides a medium ac... Read More about FH-MAC: A Multi-Channel Hybrid MAC Protocol for Wireless Mesh Networks.

Integrated many-to-many multicast addressing and access control method (2009)
Conference Proceeding
Romdhani, I., & Yassin Al-Dubai, A. (2009). Integrated many-to-many multicast addressing and access control method. In 2009 IEEE Symposium on Computers and Communications (649-654). https://doi.org/10.1109/iscc.2009.5202288

IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on the source side. However, current IP multicast deployment figure is still fa... Read More about Integrated many-to-many multicast addressing and access control method.

A critique of JCSP networking (2008)
Conference Proceeding
Chalmers, K., Kerridge, J., & Romdhani, I. (2008). A critique of JCSP networking. In P. H. Welch, S. Stepney, F. Polack, F. R. Barnes, A. McEwan, G. S. Stiles, …A. T. Sampson (Eds.), Communicating Process Architectures 2008 (271-291). https://doi.org/10.3233/978-1-58603-907-3-271

We present a critical investigation of the current implementation of JCSP Networking, examining in detail the structure and behavior of the current architecture. Information is presented detailing the current architecture and how it operates, and wea... Read More about A critique of JCSP networking.

Design and Analysis of Multicast Communication in Multidimensional Mesh Networks (2007)
Conference Proceeding
Al-Dubai, A., Ould-Khaoua, M., & Romdhani, I. (2007). Design and Analysis of Multicast Communication in Multidimensional Mesh Networks. In I. Stojmenovic, R. Thulasiram, L. Yang, W. Jia, M. Guo, & R. de Mello (Eds.), Parallel and Distributed Processing and Applications (868-882). https://doi.org/10.1007/978-3-540-74742-0_77

This paper addresses the issue of multicast communication in scalable interconnection networks, using path-based scheme. Most existing multicast algorithms either assume a fixed network size, low dimensional networks or only consider the latency at... Read More about Design and Analysis of Multicast Communication in Multidimensional Mesh Networks.

Mobility in JCSP: new mobile channel and mobile process models. (2007)
Conference Proceeding
Chalmers, K., Kerridge, J., & Romdhani, I. (2007). Mobility in JCSP: new mobile channel and mobile process models. In A. McEwan, S. Schneider, W. Ifill, & P. Welch (Eds.), Communicating Process Architectures 2007 (163-182)

The original package developed for network mobility in JCSP, although useful, revealed some limitations in the underlying models permitting code mobility and channel migration. In this paper, we discuss these limitations, as well as describe the new... Read More about Mobility in JCSP: new mobile channel and mobile process models..

On The Design of High Throughput Adaptive Multicast Communication (2007)
Conference Proceeding
Al-Dubai, A. Y., & Romdhani, I. (2007). On The Design of High Throughput Adaptive Multicast Communication. In Proceedings of the 6th International Symposium on Parallel and Distributed Computing (ISPDC-2007) (37-38). https://doi.org/10.1109/ispdc.2007.39

The efficient and high throughput multicast communication in interconnection networks is known as a fundamental but hard problem. In the literature, most of the related works handle multicast communication within limited operating conditions and low... Read More about On The Design of High Throughput Adaptive Multicast Communication.

Mobile IP conditional binding update. (2007)
Conference Proceeding
Romdhani, I., & Al-Dubai, A. (2007). Mobile IP conditional binding update. In 1st IEEE Workshop on Autonomic Communication and Network Management ACNM-2007, 10th IFIP/IEEE Symposium on Integrated Management (64-70)

Mobile IP protocols use a correspondent registration procedure between a Mobile Node (MN) and its Correspondent Nodes (CNs) to maintain a valid and up-to-date binding association between MN’s home address and its current care-ofaddress whenever a han... Read More about Mobile IP conditional binding update..

Mobile Multicast Route Optimisation (2006)
Conference Proceeding
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006). Mobile Multicast Route Optimisation. In IEEE International Conference on Communications, 2006. ICC '06 (1977-1983). https://doi.org/10.1109/icc.2006.255060

The multiparty nature of multicast applications presents new challenges for Mobile IP users. Unfortunately, when a multicast receiver is mobile, it will experience additional delay in receiving multicast packets due to handover delay, join latency, a... Read More about Mobile Multicast Route Optimisation.

A Performance Study of Path Based Multicast Communication Algorithms (2006)
Conference Proceeding
Al-Dubai, A., & Romdhani, I. (2006). A Performance Study of Path Based Multicast Communication Algorithms. In International Symposium on Parallel Computing in Electrical Engineering (PARELEC 2006) (245-250). https://doi.org/10.1109/parelec.2006.7

Multicast communication?s history has been driven by many schemes; however, a few have shown their efficiency on interconnection networks. Among these schemes, path based multicast has been proven to be more efficient in handling multicast, than thos... Read More about A Performance Study of Path Based Multicast Communication Algorithms.

Performance evaluation of JCSP Micro Edition: JCSPme (2006)
Conference Proceeding
Chalmers, K., Kerridge, J., & Romdhani, I. (2006). Performance evaluation of JCSP Micro Edition: JCSPme. In P. Welch, J. Kerridge, & F. R. M. Barnes (Eds.), Proceedings of Communicating Process Architectures 2006 (31-40)

Java has become a development platform that has migrated from its initial focus for small form devices, to large full scale desktop and server applications and finally back to the small in the form of Java enabled mobile phones. Here we discuss the n... Read More about Performance evaluation of JCSP Micro Edition: JCSPme.

On High Performance Multicast Algorithms for Interconnection Networks (2006)
Conference Proceeding
Al-Dubai, A., Ould-Khaoua, M., & Romdhani, I. (2006). On High Performance Multicast Algorithms for Interconnection Networks. In M. Gerndt, & D. Kranzlmüller (Eds.), High Performance Computing and Communications; Lecture Notes in Computer Science (330-339). https://doi.org/10.1007/11847366_34

Although multicast communication, in interconnection networks has been a major avenue for a lot of research works found in literature, there are several key issues that should still be improved in order to meet the increasing demand for service quali... Read More about On High Performance Multicast Algorithms for Interconnection Networks.

Hierarchical Home Agent Architecture for Mobile IP Communications (2006)
Conference Proceeding
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006). Hierarchical Home Agent Architecture for Mobile IP Communications. In 11th IEEE Symposium on Computers and Communications, 2006. ISCC '06. Proceedings (136-141). https://doi.org/10.1109/iscc.2006.84

While the Mobile IP protocol does not exclude the use of multiple Home Agents (HAs), it does not impose any particular model either. Recent solutions propose that a mobile node uses multiple HAs located in different physical links in his home network... Read More about Hierarchical Home Agent Architecture for Mobile IP Communications.

Transparent Handover for Mobile Multicast Sources (2006)
Conference Proceeding
Romdhani, I., Bettahar, H., & Bouabdallah, A. (2006). Transparent Handover for Mobile Multicast Sources. In International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006. ICN/ICONS/MCL 2006 (145-145). https://doi.org/10.1109/icniconsmcl.2006.217

The Internet research community has proposed many routing protocols to support efficient multicast application. However, these protocols were developed for multicast parties whose members are topologically stationary, and they thus do not support bot... Read More about Transparent Handover for Mobile Multicast Sources.

Multicast Routing (2005)
Patent
Romdhani, I. (2005). Multicast Routing. WO2006US02514 20060119

A method, and system for routing multicast data traffic to a mobile node (48), e.g. a mobile receiver or a Mobile Router, in a packet data network (41), for example IP multicast in an IPv4 or an IPv6 network, comprising: a home agent (52) receiving m... Read More about Multicast Routing.

Network node, a communication network and a method of operation therefor (2005)
Patent
Lach, H., & Romdhani, I. (2005). Network node, a communication network and a method of operation therefor. US20050720871 20051209

A communication network (100) comprises a roaming network node (109) which may move within the network. The network node (109) comprises a network interface (201) for receiving data from a first node (107) of the network (100). The received data may... Read More about Network node, a communication network and a method of operation therefor.

IP mobile multicast: Challenges and solutions (2004)
Journal Article
Romdhani, I., Kellil, M., Lach, H., Bouabdallah, A., & Bettahar, H. (2004). IP mobile multicast: Challenges and solutions. Communications Surveys and Tutorials, IEEE Communications Society, 6(1), 18-41. https://doi.org/10.1109/comst.2004.5342232

This article outlines the challenges of IP multicast over Mobile IP. Then it provides a comprehensive overview of existing multicast solutions to handle mobile sources and receivers in both the Mobile IPv4 and the Mobile IPv6 environments. The solut... Read More about IP mobile multicast: Challenges and solutions.