Imed Romdhani

Imed Romdhani
Edinburgh Napier University · School of Computing

PhD
IoT, Edge Computing, Protocol Design, IPv6, Multicast

About

127
Publications
210,869
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,294
Citations
Introduction
Dr Imed Romdhani is a full time Associate Professor in networking at Edinburgh Napier University since June 2005. He was awarded his PhD from the University of Technology of Compiegne (UTC), France in May 2005. He holds also an engineering and a Master degree in networking obtained respectively in 1998 and 2001 from the National School of Computing (ENSI, Tunisia) and Louis Pasteur University (ULP, France). He worked extensively with Motorola Research Labs in Paris and authored 4 patents.
Additional affiliations
June 2005 - July 2017
Edinburgh Napier University
Position
  • Professor
October 2001 - May 2005
Motorola Labs Paris
Position
  • R&D Research Engineer
October 2001 - May 2005
Université de Technologie de Compiègne
Position
  • PhD Student
Education
October 2001 - May 2005
Université de Technologie de Compiègne
Field of study
  • Computer Science
March 2000 - March 2001
University of Strasbourg
Field of study
  • Computer Science
September 1993 - July 1998

Publications

Publications (127)
Article
Full-text available
Download it from: http://dl.acm.org/citation.cfm?id=3041956 Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, including the medical field, the entertainment and ambient intelligence areas. This survey paper places substantial emph...
Method
Full-text available
A practical guideline that explains step by step how to identify relevant and up-to-date bibliographical references for any research field or study and how to write a critical and in-depth comprehensive literature review.
Book
Full-text available
In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for single users and businesses since even a single attack can result in compromised data and sufficient losses. Massive losses and frequent attacks dictate the need for accurate and...
Article
Full-text available
On a multi-access network, one of the PIM routers is elected as a Designated Router (DR). On the last hop LAN, the PIM DR is responsible for tracking local multicast listeners and forwarding traffic to these listeners if the group is operating in PIM-SM. In this document, we propose a mechanism to elect backup DR on a shared LAN. A backup DR on LAN...
Cover Page
Full-text available
This book aims to bring together the latest research findings on blockchain technology and its application to cybersecurity and privacy. In the context of these trends, the forthcoming special section on blockchain for cybersecurity in CPS, will address significant issues in the field. It will provide a sampling of recent advances and ideas on rese...
Article
The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was standardised by the IETF ROLL Working Group to address the routing issues in the Internet of Things (IoT) Low-Power and Lossy Networks (LLNs). RPL builds and maintains a Destination Oriented Directed Acyclic Graph (DODAG) topology using pieces of information propagated within the...
Book
Full-text available
This book presents state-of-the-art research on artificial intelligence and blockchain for future cybersecurity applications. The accepted book chapters covered many themes, including artificial intelligence and blockchain challenges, models and applications, cyber threats and intrusions analysis and detection, and many other applications for smart...
Article
Internet of Things (IoT) has emerged as a key component of all advanced critical infrastructures. However, with the challenging nature of IoT, new security breaches have been introduced, especially against the Routing Protocol for Low-power and Lossy Networks (RPL). Artificial-Intelligence-based technologies can be used to provide insights to deal...
Article
Full-text available
OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While SDN’s logically centralized control plane could enhance network security by providing global visibil...
Article
This paper reviews big data and Internet of Things (IoT)-based applications in smart environments. The aim is to identify key areas of application, current trends, data architectures, and ongoing challenges in these fields. To the best of our knowledge, this is a first systematic review of its kind, that reviews academic documents published in peer...
Book
Full-text available
Blockchain Technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not matter. Blockchain technology has infiltrated all area...
Article
The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to internal attackers and selfish behaviours. To address the lack of robust security mechanisms in RPL,...
Article
Full-text available
Waterborne pathogens affect all waters globally and proceed to be an ongoing concern. Previous methods for detection of pathogens consist of a high test time and a high sample consumption, but they are very expensive and require specialist operators. This study aims to develop a monitoring system capable of identifying waterborne pathogens with par...
Preprint
The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to internal attackers and selfish behaviours. To address the lack of robust security mechanisms in RPL,...
Article
Educational institutions suffer from the enormous amount of data that keeps growing continuously. These data are usually scattered and unorganised, and it comes from different resources with different formats. Besides, modernization vision within these institutions aims to reduce human action and replace it with automatic devices interactions. To h...
Conference Paper
OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While SDN's logically centralized control plane could enhance network security by providing global visibil...
Conference Paper
Software Defined Networking (SDN) technology increases the evolution of Internet and network development. SDN, with its logical centralization of controllers and global network overview changes the network's characteristics, on term of flexibility, availability, programmability, ...etc. However, this development increases the network communication...
Chapter
Full-text available
The Al-Derb platform provides a way for individual and group funding (crowdfunding) to help young people obtain grants for high-quality online education and training courses offered by universities and training centers. The availability of high-quality education in the Arab world is low, which affects the development of young people’s potential and...
Book
This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2017, held in Edinburgh, UK, in December 2017. The 65 papers presented were carefully reviewed and selected from 103 submissions and focus on electronic collaboration be...
Article
Full-text available
In this paper, we introduce Drizzle, a new algorithm for maintaining routing information in the Low-power and Lossy Networks (LLNs). The aim is to address the limitations of the currently standardized routing maintenance (i.e. Trickle algorithm) in such networks. Unlike Trickle, Drizzle has an adaptive suppression mechanism that assigns the nodes d...
Chapter
In the internet of things (IoT) vision, people, systems, and objects with sensing and/or actuating capabilities communicate to monitor and control the physical world. Nowadays, the IoT concept has attracted significant attention from different application domain such as healthcare and smart homes. Indeed, self-organization and self-configuration ar...
Chapter
Full-text available
The internet of things (IoT) is a new paradigm where users, objects, and any things are interconnected using wired and wireless technology such as RFID, ZigBee, WSN, NFC, Bluetooth, GPRS, and LTE. In this last decade, the IoT concept has attracted significant attention from both industrial and research communities. Many application domains may have...
Conference Paper
In Wireless Sensor Networks, clustering sensor nodes into disjoint groups is widely used to achieve load balance and increase network lifetime. In particular, traditional unequal clustering approaches where small clusters located close to the base station suffer from rapid energy depletion compared to others.To overcome the traffic load problem of...
Conference Paper
Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure is detected. However, depending on a stale route to recover from a broken link could increase the delay to recover from the broken link and degrade the network performance. In...
Technical Report
Full-text available
Trickle algorithm used in RPL routing protocol suffers from some issues related to power, network convergence time and overhead and load-distribution. To optimize this algorithm for Low-power and Lossy Networks (LLNs), a new algorithm called Drizzle is introduced. Drizzle uses an adaptive suppression mechanism that permits the nodes to have differe...
Article
Medium Access Control (MAC) protocols based on Time Division Multiple Access (TDMA) can improve the reliability and efficiency of WBAN. However, traditional static TDMA techniques adopted by IEEE 802.15.4 and IEEE 802.15.6 do not sufficiently consider the channel status or the buffer requirements of the nodes within heterogeneous contexts. Although...
Article
To secure e-health communications, key management protocols play a vital role in the security process. Nevertheless, current e-health systems are unable to run existing standardised key management protocols due to their limited energy power and computational capabilities. In this paper, we introduce two solutions to tailor MIKEY-Ticket protocol to...
Article
The implementation of wireless electronic simulation signals, as an approach to the visual search behaviour recognition, is not a straightforward task. This paper discusses the process of modelling human interactions in a real game by wireless electronic visual stimuli, which could lead Human Computer Interaction (HCI) researchers in sports and edu...
Technical Report
Full-text available
This document proposes an extended Objective Function(OF)that balances the number of child nodes of the parent nodes to avoid the overloading problem and ensure node lifetime maximization in the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL). The standard OFs are used to build a Destination Oriented Directed Acyclic Graph (DODAG) wher...
Article
Full-text available
E-health applications have emerged as a promising approach to provide unobtrusive and customizable support to elderly and frail people based on their situation and circumstances. However, due to limited resources available in such systems and data privacy concerns, security issues constitute a major obstacle to their safe deployment. To secure e-he...
Conference Paper
Full-text available
The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads or delays to repair the broken link is a desirable goal for any routing protocol. The route recovery algorithm in reactive routing protocols like AODV occurs only after a lin...
Technical Report
Full-text available
This document proposes an extended Objective Function(OF) that balances the number of children nodes of the parent nodes to avoid the overloading problem and ensure node lifetime maximization in the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL). The standard OFs are used to build a Destination Oriented Directed Acyclic Graph (DODAG)...
Article
Full-text available
Wireless body area networks (WBANs) facilitate efficient and cost-effective e-health care and well-being applications. The WBAN has unique challenges and features compared to other wireless sensor networks. In addition to battery power consumption, the vulnerability and the unpredicted channel behaviour of the MAC layer make channel access a seriou...
Conference Paper
Full-text available
In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of Things (IoT) applications. In this paper we implemented and evaluated the performance of RPL (Routing Protocol for Low-Power and Lossy Networks) routing protocol under mobile...
Conference Paper
Full-text available
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, was adopted for routing information maintenance in such networks. This algorithm was originally designed for disseminating code updates through a wireless sensor network Thus, when it...
Conference Paper
Full-text available
Wireless body area networks (WBANs) facilitate efficient and cost-effective e-health care and well-being applications. The WBAN has unique challenges and features compared to other wireless sensor networks. In addition to battery power consumption, the vulnerability and the unpredicted channel behaviour of the MAC layer make channel access a seriou...
Conference Paper
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely recommended approaches to sustaining a network throughout its lifetime. Despite a number of research activities associated with clustering in WSNs, some aspects of clustering...
Conference Paper
Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely recommended approaches to sustaining a network throughout its lifetime. Despite a number of research activities associated with clustering in WSNs, some aspects of clustering...
Conference Paper
There is a growing demand for smart tools and devices that measure visual reaction time during sports and physical activities in outdoor environments. However, one of the major problems is the need to maintain an on-time 1 pulse per second (pps) reference with a known uncertainty. The introduction of ultra-low-power wireless chipsets such as Zigbee...
Conference Paper
Full-text available
Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. In this paper, we propose a new security scheme for the Internet of things and mainly for the RPL (Routing Protocol for Low-power and Lossy Networks) called: Metric-based RPL...
Technical Report
Full-text available
This document proposes an extended Objective Function(OF) that balances the number of children nodes of the parent nodes to avoid the overloading problem and ensure node lifetime maximization in the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL). The standard OFs are used to build a Destination Oriented Directed Acyclic Graph (DODAG)...
Book
An essential reference on the latest trends, issues, and advances in IoT security, providing both theoretical and practical knowledge Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT)....
Chapter
This chapter describes the Social Internet of Things (SIoT), in which a network of smart objects can establish relationships with other smart objects independent of human interaction. Two types of relationships are described: the parental object relationship (POR), which is established among objects of the same type, and the ownership object relati...
Chapter
This chapter introduces the main concepts involved in the security of the Internet of Things (IoT). These include confidentiality; integrity and authenticity; availability; nonrepudiation; and access control, which further includes identification, authentication, and authorization. The differences between security and privacy are described, as well...
Chapter
This chapter provides an overview of confidentiality and security for Internet of Things (IoT) based healthcare. E-health systems and applications, which are defined as wireless networks connecting healthcare devices, are first addressed. Security issues specific to e-health applications are then discussed, including the particular sensitivity of p...
Conference Paper
Energy efficiency is one of the major issues in Wireless Sensor Networks (WSNs), due to the limited power and processing capabilities of the Sensor Nodes (SNs). The clustering techniques proved to be the effective solution to improve the energy efficiency and prolong the network lifetime. However, in the data transmission task, the Cluster Heads (C...
Conference Paper
Full-text available
Wireless Body Area Network (WBAN) is a technology that revolutionises our understanding of the future digitised healthcare systems. WBAN has unique challenges and features compared to other wireless sensor networks. In addition to battery power consumption, the vulnerability and the unpredicted channel behaviour make channel access a serious proble...
Chapter
Since sensor nodes have limited energy resources, prolonging network lifetime and improving scalability are essential elements in energy- efficient Wireless Sensor Networks (WSNs). Most existing approaches consider the residual energy of a single node when electing a cluster head (CH), omitting other factors associated with the node, such as its lo...
Conference Paper
Full-text available
Abstract— Recently, IETF standardized two objective functions for RPL to optimize the path selections towards the sink node. However, both objective functions used to build topology suffers from a heavily imbalance load traffic in bottleneck nodes. Consequently, that induces disconnecting a part of network due to the energy of the overburdened pref...
Technical Report
Full-text available
While Cooja has been proven to be an ideal tool for the simulation of RPL in WSNs, there are challenges involved in its use, particularly in regard to a lack of documentation. The Contiki website provides an image of Instant Contiki which can then be used with the virtualisation tool VMware. Once Instant Contiki is successfully started the Contiki...
Article
Full-text available
Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile applications based on conditions of the Shannon entropy, Guessing entropy and Minimum entropy. We show how to substantially improve upon the strength of passwords based on the...
Conference Paper
Multimedia Internet KEYing protocol (MIKEY)aims at establishing secure credentials between two communicating entities. However, existing MIKEY modes fail to meet the requirements of low-power and low-processing devices. To address this issue, we combine two previously proposed approaches to introduce a new distributed and compressed MIKEY mode for...
Conference Paper
Full-text available
Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing standard based protocols. Among these protocols, MIKEY (Multimedia Internet KEYing) aims at establishing security credentials between two communicating entities. However, the...
Article
To secure group communications, several group key management protocols have been introduced. However, the majority of the proposed solutions are not adapted to the Internet of Things (IoT) and its strong processing, storage, and energy constraints. In this context, we introduce a novel decentralized and batch-based group key management protocol to...
Chapter
In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the design of WSN energy efficient algorithms and standards. The standard IEEE 802.15.4 has emerged for WSNs in which the legacy operations are based on the principle that the power...
Chapter
Full-text available
Minimizing the energy consumption for data transmission is one of the most important design considerations in Wireless Sensor Networks (WSNs). The clustering approach is considered one of the most effective methods to prolong the network lifetime in WSNs. Hybrid, Energy-Efficient, and Distributed clustering approach (HEED) is considered one of the...
Conference Paper
Full-text available
The IEEE 802.15.4 standard is designed for low-power and low-rate wireless Personal Area Networks. Although energy is a key parameter in shaping the communication and interaction methods of wireless sensor nodes, the specification of the MAC layer doesn't embed enough information for energy and mobility support. For instance, using the IEEE 802.15....
Conference Paper
Full-text available
In Wireless Sensor Networks (WSNs), clustering techniques are among the effective solutions to reduce energy consumption and prolong the network lifetime. During the iterative re-clustering process, extra energy and time are consumed especially at the setup phase of every round. To address these issues, we propose a new cluster-based protocol namel...