The International Arab Journal of Information Technology (IAJIT)

Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve

University, Jordan 3Department of Information Technology, Al-Balqa Applied University, Jordan

Exploitation of ICMP Time Exceeded Packets for A Large-Scale Router Delay Analysis

Ali Gezer1 and Gary Warner2 1Electronic and Telecommunication Technology, Kayseri University, Turkey 2Computer Science, University of Alabama at Birmingham, US

Identity Identification and Management in the Internet of Things

Zina Houhamdi1 and Belkacem Athamena2 1Software Engineering Department, College of Engineering, Al Ain University, UAE 2Business Administration Department, College of Business, Al Ain University, UAE

A Fog Computing-based Framework for Privacy Preserving IoT Environments

Dhiah el Diehn Abou-Tair1, Simon Büchsenstein2, and Ala’ Khalifeh1 1School of Electrical Engineering and Information Technology, German Jordanian University, Jordan 2Embedded Systems Engineering, University of Freiburg, Germany

Privacy Preserving Authenticated Key Agreement based on Bilinear Pairing for uHealthcare

Sunghyun Cho1 and Hyunsung Kim2 1College of Computing, Sungkyunkwan University, Korea 2School of Computer Science, Kyungil University, Korea

LoRaWAN Energy Optimization with Security Consideration

Ala Khalifeh1, Khaled Aldahdouh1 and Sahel Alouneh1,2 1School of Electrical Engineering and Information Technology, German Jordanian University, Jordan 2College of Engineering, Al Ain University, UAE

A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-

Based IIoT Security, Mourade Azrour, Said Benkirane, Mouaad Mohy-Eddine, Hanaa Attou, Maryam Douiba