Skip to main content

Research Repository

Advanced Search

Outputs (257)

Performance Evaluation of RPL Protocol under Mobile Sybil Attacks (2017)
Presentation / Conference Contribution
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017, August). Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. Presented at 2017 IEEE Trustcom/BigDataSE/ICESS

In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of Things (IoT) applications. In this paper we implemented and evaluated the... Read More about Performance Evaluation of RPL Protocol under Mobile Sybil Attacks.

Pollinator importance networks illustrate the crucial value of bees in a highly speciose plant community (2017)
Journal Article
Ballantyne, G., Baldock, K. C. R., Rendell, L., & Willmer, P. (2017). Pollinator importance networks illustrate the crucial value of bees in a highly speciose plant community. Scientific Reports, 7(1), Article 8389. https://doi.org/10.1038/s41598-017-08798-x

Accurate predictions of pollination service delivery require a comprehensive understanding of the interactions between plants and flower visitors. To improve measurements of pollinator performance underlying such predictions, we surveyed visitation f... Read More about Pollinator importance networks illustrate the crucial value of bees in a highly speciose plant community.

Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT (2017)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Romdhani, I., Nasser, Y., & Boukerche, A. (2017, May). Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT. Presented at 2017 IEEE International Conference on Communications (ICC)

Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopted for routing information maintenance in such networks. This algorithm is o... Read More about Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT.

Trust-Based Defence Model Against MAC Unfairness Attacks for IoT (2017)
Presentation / Conference Contribution
Djedjig, N., Tandjaoui, D., Romdhani, I., & Medjek, F. (2017, July). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. Presented at The Thirteenth International Conference on Wireless and Mobile Communications

The vulnerability of IoT networks makes channel access security a serious problem. The IEEE 802.15.4 MAC (Media Access Control) layer faces the risk of attacks from malicious nodes which attempts to get a dominating position and hold unfair advantage... Read More about Trust-Based Defence Model Against MAC Unfairness Attacks for IoT.

Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment (2017)
Journal Article
Asif, R., & Buchanan, W. J. (2017). Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Security and Communication Networks, 2017, 1-10. https://doi.org/10.1155/2017/7616847

There is current significant interest in Fiber-to-the-Home (FTTH) networks, i.e. end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile copper wire connections. However, in near future it is envisaged that FTTH... Read More about Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment.

A new enhanced RPL based routing for Internet of Things (2017)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Ekonomou, E., & Wadhaj, I. (2017, June). A new enhanced RPL based routing for Internet of Things. Presented at 2017 IEEE International Conference on Communications Workshops (ICC Workshops)

The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently standardized for routing in the constrained Internet of Things networks. Unfortunately, the RPL storing mode has been found restricted by storage limitations in the ro... Read More about A new enhanced RPL based routing for Internet of Things.

Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption (2017)
Presentation / Conference Contribution
Asif, R., & Buchanan, W. J. (2017, June). Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. Presented at 10th IEEE International Conference on Internet of Things (iThings‐2017), Exeter, UK

Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the QKD infrastructure is compatible with the already existing telecommunicati... Read More about Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption.

5G: What Architecture to Serve Vertical Industries? (2017)
Presentation / Conference Contribution
Thuemmler, C. (2017, May). 5G: What Architecture to Serve Vertical Industries?. Presented at IEEE ICC 2017

The implementation and roll out of 5G technology is progressing at increasing speed and will impact all industrial verticals. Health is globally a very important industry worth between 5 and 20% of GDP. This event is a co-creation event designed to e... Read More about 5G: What Architecture to Serve Vertical Industries?.

New trust metric for the RPL routing protocol (2017)
Presentation / Conference Contribution
Romdhani, I., Djedjig, N., Medjek, F., & Tandjaoui, D. (2017, April). New trust metric for the RPL routing protocol. Presented at 2017 8th International Conference on Information and Communication Systems (ICICS)

Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. In this paper, we propose a new security scheme for the Internet of things... Read More about New trust metric for the RPL routing protocol.

Estimating 3D trajectories from 2D projections via disjunctive factored four-way conditional restricted Boltzmann machines (2017)
Journal Article
Mocanu, D. C., Bou Ammar, H., Puig, L., Eaton, E., & Liotta, A. (2017). Estimating 3D trajectories from 2D projections via disjunctive factored four-way conditional restricted Boltzmann machines. Pattern Recognition, 69, 325-335. https://doi.org/10.1016/j.patcog.2017.04.017

Estimation, recognition, and near-future prediction of 3D trajectories based on their two dimensional projections available from one camera source is an exceptionally difficult problem due to uncertainty in the trajectories and environment, high dime... Read More about Estimating 3D trajectories from 2D projections via disjunctive factored four-way conditional restricted Boltzmann machines.

Reliability and energy efficiency enhancement in wireless body area networks for e-health (2017)
Presentation / Conference Contribution
Salayma, M., Al-Dubai, A., & Romdhani, I. (2016, November). Reliability and energy efficiency enhancement in wireless body area networks for e-health. Presented at 2016 19th Conference of Open Innovations Association (FRUCT), Jyväskylä, Finland

Wireless Body Area Network (WBAN) is a technology that revolutionises our understanding of the future digitised healthcare systems. WBAN has unique challenges and features compared to other wireless sensor networks. In addition to battery power consu... Read More about Reliability and energy efficiency enhancement in wireless body area networks for e-health.

Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence (2017)
Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2017). Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence. ACM computing surveys, 50(1), Article 3. https://doi.org/10.1145/3041956

Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, including the medical field, the entertainment and ambient intelligence areas. T... Read More about Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence.

5G innovations for new business opportunities (2017)
Report
Sébastien Bedo, J., Eddine El Ayoubi, S., Filippou, M., Gavras, A., Giustiniano, D., Iovanna, P., Manzalini, A., Queseth, O., Rokkas, T., Surridge, M., & Tjelta, T. (2017). 5G innovations for new business opportunities. Brussels: European Commission / 5G PPP

5G is the next generation mobile network that enables
innovation and supports progressive change across all
vertical industries and across our society1. Through its
Radio Access Network (RAN) design and its orchestrated
end-to-end architecture, i... Read More about 5G innovations for new business opportunities.

The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud (2017)
Presentation / Conference Contribution
Pitropakis, N., Lyvas, C., & Lambrinoudakis, C. (2017, February). The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud. Presented at The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, Athens, Greece

The financial crisis made companies around the world search for cheaper and more efficient solutions to cover their needs in terms of computational power and storage. Their quest came to end with the birth of Cloud Computing infrastructures. However,... Read More about The Greater The Power, The More Dangerous The Abuse: Facing Malicious Insiders in The Cloud.

Securing the Internet of Things (2017)
Book
Romdhani, I. (2017). S. Li, & L. Da Xu (Eds.), Securing the Internet of Things. Elsevier

Key Features

Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures
Explores how the threats in IoT are different from traditional ad hoc or infrastructural network... Read More about Securing the Internet of Things.

BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. (2017)
Book Chapter
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2017). BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC. In M. Grzenda, J. Furtak, J. Legierski, & A. I. Awad (Eds.), Advances in Networking Systems Architectures, Security, and Applications (317-335). Springer

The IEEE 802.15.4 standard supports both physical and Media Access Con-trol (MAC) layers of low rate Wireless Sensor Network (WSNs). However, this stand-ard considers only the ideal linear power consumption, omitting the fact that the diffu-sion prin... Read More about BARBEI: a new adaptive battery aware and reliable beacon enabled technique for IEEE802.15.4 MAC..

10Gbit/s mode-multiplexed QPSK transmission using MDM-to-MFDM based single coherent receiver for intra- and inter data center networking (2017)
Journal Article
Asif, R., & Haithem, M. (2017). 10Gbit/s mode-multiplexed QPSK transmission using MDM-to-MFDM based single coherent receiver for intra- and inter data center networking. Optics Communications, 391, 106-110. https://doi.org/10.1016/j.optcom.2017.01.022

Generalized few-mode-fiber (FMF) transmission uses N coherent receivers for mode detection, where N scales with the number of fiber modes. Multiple coherent receivers increase the cost of optical network units (ONUs) in access networks, specifically... Read More about 10Gbit/s mode-multiplexed QPSK transmission using MDM-to-MFDM based single coherent receiver for intra- and inter data center networking.

A new efficient cross-layer relay node selection model for Wireless Community Mesh Networks (2017)
Journal Article
Zhao, L., Al-Dubai, A., Li, X., Chen, G., & Min, G. (2017). A new efficient cross-layer relay node selection model for Wireless Community Mesh Networks. Computers and Electrical Engineering, 61, 361-372. https://doi.org/10.1016/j.compeleceng.2016.12.031

Current networking technologies are not perfectly equipped to support Quality of Service (QoS), which is vital for real-time multimedia applications in Wireless Community Mesh Networks (WCNs). Therefore, there is a need to devise innovative routing a... Read More about A new efficient cross-layer relay node selection model for Wireless Community Mesh Networks.