2018 International Symposium on Networks, Computers and Communications (ISNCC), 2018
Utilising multiple disjoint paths in multiple channels can improve network performance by enablin... more Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure is detected. However, depending on a stale/invalid route to recover from a broken link could increase the delay to recover from the broken link and degrade the network performance. In this paper, we propose a new MAC protocol (RIVC-MB) to enhance communication reliability in the multipath multichannel routing protocol. The reliability of transmitting/re-routing the data packet in multipath multichannel routing protocol is improved by providing early route invalidity detection and early switchover. Waiting time to access the medium is also improved, when a node is attempting to access a busy medium, by re-routing the data packet via the alternative route. The RIVC-MB protocol uses the cross-layer interaction between MAC and routing protocols to achieve these goals. The proposed protocol is implemented and extensi...
OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main... more OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While SDN's logically centralized control plane could enhance network security by providing global visibility of the network state, it still has many side effects. The intelligent controllers that orchestrate the dumb switches are overloaded and become prone to failure. Delegating some level of control logic to the switches can offload the controllers from local state based decisions that do not require global network-wide knowledge. Thus, this paper, to the best of our knowledge, is the first to propose the delegation of typical security functions from specialized middleboxes to the data plane. We leverage the opportunities offered by P4 language to implement the functionality of authenticating nodes using port knocking. Our experimental results indicate that our proposed technique improves the network overall availability by offloading the controller as well as reducing the traffic in the network without noticeable negative impact on switches' performance.
... I. Romdhani Napier University School of Computing10 Colinton Road Edinburgh, EH10 5DT, UK I.R... more ... I. Romdhani Napier University School of Computing10 Colinton Road Edinburgh, EH10 5DT, UK I.Romdhani@napier.ac.uk ... UDP and TCP represent the most typical traffic in the Internet because they support World Wide Web, file transfer, the establishment of a remote ...
This chapter describes the Social Internet of Things (SIoT), in which a network of smart objects ... more This chapter describes the Social Internet of Things (SIoT), in which a network of smart objects can establish relationships with other smart objects independent of human interaction. Two types of relationships are described: the parental object relationship (POR), which is established among objects of the same type, and the ownership object relationship (OOR), which is based on objects that may be of different types but belong to the same user (e.g., mobile phones, game consoles, etc.). The chapter concludes by suggesting that in order to make SIoT a reality, devices must be enhanced with cognitive capabilities, and by recommending further security measures that should be taken into consideration given these enhanced capabilities.
2018 International Symposium on Networks, Computers and Communications (ISNCC), 2018
Utilising multiple disjoint paths in multiple channels can improve network performance by enablin... more Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure is detected. However, depending on a stale/invalid route to recover from a broken link could increase the delay to recover from the broken link and degrade the network performance. In this paper, we propose a new MAC protocol (RIVC-MB) to enhance communication reliability in the multipath multichannel routing protocol. The reliability of transmitting/re-routing the data packet in multipath multichannel routing protocol is improved by providing early route invalidity detection and early switchover. Waiting time to access the medium is also improved, when a node is attempting to access a busy medium, by re-routing the data packet via the alternative route. The RIVC-MB protocol uses the cross-layer interaction between MAC and routing protocols to achieve these goals. The proposed protocol is implemented and extensi...
OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main... more OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While SDN's logically centralized control plane could enhance network security by providing global visibility of the network state, it still has many side effects. The intelligent controllers that orchestrate the dumb switches are overloaded and become prone to failure. Delegating some level of control logic to the switches can offload the controllers from local state based decisions that do not require global network-wide knowledge. Thus, this paper, to the best of our knowledge, is the first to propose the delegation of typical security functions from specialized middleboxes to the data plane. We leverage the opportunities offered by P4 language to implement the functionality of authenticating nodes using port knocking. Our experimental results indicate that our proposed technique improves the network overall availability by offloading the controller as well as reducing the traffic in the network without noticeable negative impact on switches' performance.
... I. Romdhani Napier University School of Computing10 Colinton Road Edinburgh, EH10 5DT, UK I.R... more ... I. Romdhani Napier University School of Computing10 Colinton Road Edinburgh, EH10 5DT, UK I.Romdhani@napier.ac.uk ... UDP and TCP represent the most typical traffic in the Internet because they support World Wide Web, file transfer, the establishment of a remote ...
This chapter describes the Social Internet of Things (SIoT), in which a network of smart objects ... more This chapter describes the Social Internet of Things (SIoT), in which a network of smart objects can establish relationships with other smart objects independent of human interaction. Two types of relationships are described: the parental object relationship (POR), which is established among objects of the same type, and the ownership object relationship (OOR), which is based on objects that may be of different types but belong to the same user (e.g., mobile phones, game consoles, etc.). The chapter concludes by suggesting that in order to make SIoT a reality, devices must be enhanced with cognitive capabilities, and by recommending further security measures that should be taken into consideration given these enhanced capabilities.
Uploads
Papers by Imed Romdhani