In Wireless Sensor Networks, clustering sensor nodes into disjoint groups is widely used to achie... more In Wireless Sensor Networks, clustering sensor nodes into disjoint groups is widely used to achieve load balance and increase network lifetime. In particular, traditional unequal clustering approaches where small clusters located close to the base station suffer from rapid energy depletion compared to others.To overcome the traffic load problem of near base station clusters, we propose a new two level unequal cluster lightweight approach based on a threshold defined by the base station and using nodes's residual energy and the distance from base station. Moreover, we developed a new re-clustering technique where Cluster heads rotate locally in each cluster on a per level basis. Simulation results shows that the proposed mechanism outperforms its counterpart algorithms.
2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2017
The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an effici... more The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads or delays to repair the broken link is a desirable goal for any routing protocol. The route recovery algorithm in reactive routing protocols like AODV occurs only after a link failure is detected. However, we propose a new route discovery mechanism called Route Migration over Multiple link failure in Multi-Channel (RMMMC), which combines multiple paths and channels to provide a disjointed alternative route. When link failure is detected, the RMMMC reroutes the data packet through the alternative route in alternative channels that have been previously discovered. Furthermore, the RMMMC is resilient to multiple link failures. Unlike other route recovery approaches, nodes in RMMMC are considered to be equipped with a single transceiver. The RMMMC scheme is implemented and extensively evaluated by using an ns-2 simulator. Simulation results show that the proposed scheme achieves a better packet delivery ratio and throughout in a dense network.
2018 International Symposium on Networks, Computers and Communications (ISNCC), 2018
Utilising multiple disjoint paths in multiple channels can improve network performance by enablin... more Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure is detected. However, depending on a stale/invalid route to recover from a broken link could increase the delay to recover from the broken link and degrade the network performance. In this paper, we propose a new MAC protocol (RIVC-MB) to enhance communication reliability in the multipath multichannel routing protocol. The reliability of transmitting/re-routing the data packet in multipath multichannel routing protocol is improved by providing early route invalidity detection and early switchover. Waiting time to access the medium is also improved, when a node is attempting to access a busy medium, by re-routing the data packet via the alternative route. The RIVC-MB protocol uses the cross-layer interaction between MAC and routing protocols to achieve these goals. The proposed protocol is implemented and extensi...
OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main... more OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While SDN's logically centralized control plane could enhance network security by providing global visibility of the network state, it still has many side effects. The intelligent controllers that orchestrate the dumb switches are overloaded and become prone to failure. Delegating some level of control logic to the switches can offload the controllers from local state based decisions that do not require global network-wide knowledge. Thus, this paper, to the best of our knowledge, is the first to propose the delegation of typical security functions from specialized middleboxes to the data plane. We leverage the opportunities offered by P4 language to implement the functionality of authenticating nodes using port knocking. Our experimental results indicate that our proposed technique improves the network overall availability by offloading the controller as well as reducing the traffic in the network without noticeable negative impact on switches' performance.
This paper reviews big data and Internet of Things (IoT)-based applications in fields related to ... more This paper reviews big data and Internet of Things (IoT)-based applications in fields related to smart environments. This research is intended to identify the areas of application ,current trends, data architectures, and ongoing challenges in this field. This article, which is the first systematic review of its kind, aims to achieve this goal by using draws on academic documents published in peer-reviewed venues from 2011 to 2019, based on a four-step selection process of identification, screening, eligibility, and inclusion for the selection process. In order to examine these articles, a systematic review was conducted and six main research questions were answered. The results indicate that the integration of big data and IoT technologies creates great opportunities for smart environment applications regarding monitoring, the protection, the monitoring, and the improvement of natural resources. The tools that have been developed in these areas include smart environment monitoring, smart farming/agriculture, smart metering, and smart disaster alert). We conclude by summarizing the methods most commonly used in big data and IoT ,which we intend to serve as a starting point for future research.
... I. Romdhani Napier University School of Computing10 Colinton Road Edinburgh, EH10 5DT, UK I.R... more ... I. Romdhani Napier University School of Computing10 Colinton Road Edinburgh, EH10 5DT, UK [email protected] ... UDP and TCP represent the most typical traffic in the Internet because they support World Wide Web, file transfer, the establishment of a remote ...
This chapter describes the Social Internet of Things (SIoT), in which a network of smart objects ... more This chapter describes the Social Internet of Things (SIoT), in which a network of smart objects can establish relationships with other smart objects independent of human interaction. Two types of relationships are described: the parental object relationship (POR), which is established among objects of the same type, and the ownership object relationship (OOR), which is based on objects that may be of different types but belong to the same user (e.g., mobile phones, game consoles, etc.). The chapter concludes by suggesting that in order to make SIoT a reality, devices must be enhanced with cognitive capabilities, and by recommending further security measures that should be taken into consideration given these enhanced capabilities.
In Wireless Sensor Networks, clustering sensor nodes into disjoint groups is widely used to achie... more In Wireless Sensor Networks, clustering sensor nodes into disjoint groups is widely used to achieve load balance and increase network lifetime. In particular, traditional unequal clustering approaches where small clusters located close to the base station suffer from rapid energy depletion compared to others.To overcome the traffic load problem of near base station clusters, we propose a new two level unequal cluster lightweight approach based on a threshold defined by the base station and using nodes's residual energy and the distance from base station. Moreover, we developed a new re-clustering technique where Cluster heads rotate locally in each cluster on a per level basis. Simulation results shows that the proposed mechanism outperforms its counterpart algorithms.
2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2017
The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an effici... more The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads or delays to repair the broken link is a desirable goal for any routing protocol. The route recovery algorithm in reactive routing protocols like AODV occurs only after a link failure is detected. However, we propose a new route discovery mechanism called Route Migration over Multiple link failure in Multi-Channel (RMMMC), which combines multiple paths and channels to provide a disjointed alternative route. When link failure is detected, the RMMMC reroutes the data packet through the alternative route in alternative channels that have been previously discovered. Furthermore, the RMMMC is resilient to multiple link failures. Unlike other route recovery approaches, nodes in RMMMC are considered to be equipped with a single transceiver. The RMMMC scheme is implemented and extensively evaluated by using an ns-2 simulator. Simulation results show that the proposed scheme achieves a better packet delivery ratio and throughout in a dense network.
2018 International Symposium on Networks, Computers and Communications (ISNCC), 2018
Utilising multiple disjoint paths in multiple channels can improve network performance by enablin... more Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure is detected. However, depending on a stale/invalid route to recover from a broken link could increase the delay to recover from the broken link and degrade the network performance. In this paper, we propose a new MAC protocol (RIVC-MB) to enhance communication reliability in the multipath multichannel routing protocol. The reliability of transmitting/re-routing the data packet in multipath multichannel routing protocol is improved by providing early route invalidity detection and early switchover. Waiting time to access the medium is also improved, when a node is attempting to access a busy medium, by re-routing the data packet via the alternative route. The RIVC-MB protocol uses the cross-layer interaction between MAC and routing protocols to achieve these goals. The proposed protocol is implemented and extensi...
OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main... more OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While SDN's logically centralized control plane could enhance network security by providing global visibility of the network state, it still has many side effects. The intelligent controllers that orchestrate the dumb switches are overloaded and become prone to failure. Delegating some level of control logic to the switches can offload the controllers from local state based decisions that do not require global network-wide knowledge. Thus, this paper, to the best of our knowledge, is the first to propose the delegation of typical security functions from specialized middleboxes to the data plane. We leverage the opportunities offered by P4 language to implement the functionality of authenticating nodes using port knocking. Our experimental results indicate that our proposed technique improves the network overall availability by offloading the controller as well as reducing the traffic in the network without noticeable negative impact on switches' performance.
This paper reviews big data and Internet of Things (IoT)-based applications in fields related to ... more This paper reviews big data and Internet of Things (IoT)-based applications in fields related to smart environments. This research is intended to identify the areas of application ,current trends, data architectures, and ongoing challenges in this field. This article, which is the first systematic review of its kind, aims to achieve this goal by using draws on academic documents published in peer-reviewed venues from 2011 to 2019, based on a four-step selection process of identification, screening, eligibility, and inclusion for the selection process. In order to examine these articles, a systematic review was conducted and six main research questions were answered. The results indicate that the integration of big data and IoT technologies creates great opportunities for smart environment applications regarding monitoring, the protection, the monitoring, and the improvement of natural resources. The tools that have been developed in these areas include smart environment monitoring, smart farming/agriculture, smart metering, and smart disaster alert). We conclude by summarizing the methods most commonly used in big data and IoT ,which we intend to serve as a starting point for future research.
... I. Romdhani Napier University School of Computing10 Colinton Road Edinburgh, EH10 5DT, UK I.R... more ... I. Romdhani Napier University School of Computing10 Colinton Road Edinburgh, EH10 5DT, UK [email protected] ... UDP and TCP represent the most typical traffic in the Internet because they support World Wide Web, file transfer, the establishment of a remote ...
This chapter describes the Social Internet of Things (SIoT), in which a network of smart objects ... more This chapter describes the Social Internet of Things (SIoT), in which a network of smart objects can establish relationships with other smart objects independent of human interaction. Two types of relationships are described: the parental object relationship (POR), which is established among objects of the same type, and the ownership object relationship (OOR), which is based on objects that may be of different types but belong to the same user (e.g., mobile phones, game consoles, etc.). The chapter concludes by suggesting that in order to make SIoT a reality, devices must be enhanced with cognitive capabilities, and by recommending further security measures that should be taken into consideration given these enhanced capabilities.
Uploads
Papers by Imed Romdhani