Publications

Multimedia transport over Wireless Sensor Networks (WSN) has been a challenging task due to the limited available resources of such networks. The capability of Multipath routing to balance and distribute the load of a given flow on different...
The specific characteristics of vehicular ad hoc networks, such as high speed of nodes and frequent topology changes, impose challenges for the routing process. In addition, the advent of the Internet of Vehicles (IoV) concept along with the...
As sensor nodes are power constrained, saving energy and prolonging network lifetime have been given the greatest priority in the design of routing protocols in wireless sensor networks (WSNs). In this regard, duty‐cycling is broadly utilized as an...
Vehicular ad hoc network (VANET) nodes are characterized by their high mobility and by exhibiting different mobility patterns. Therefore, VANET clustering schemes are required to account for the mobility parameters among neighboring nodes to produce...
Vehicular cloud computing is an emerging research area which integrates the conventional cloud with the vehicular ad hoc networks. This paradigm allows vehicles to access cloud services and/or share their underutilized on-board resources. Security...
As the energy efficiency remains a key issue in wireless sensor networks, duty-cycled mechanisms acquired much interest due to their ability to reduce energy consumption by allowing sensor nodes to switch to the sleeping state whenever possible. The...
This article deals with a key distribution protocol to secure routing in large-scale Wireless Sensor Networks (WSNs) and proposes a new protocol called KDSR. The authors' protocol has two originalities: to provide a secure network structure for...
The Micro Air Vehicle Link (MAVLink in short) is a communication protocol for unmanned systems (e.g., drones, robots). It specifies a comprehensive set of messages exchanged between unmanned systems and ground stations. This protocol is used in...
Wireless Body Area Networks (WBANs), designed especially for healthcare applications require a strict guarantee of quality of service (QoS), in terms of latency, error rate and reliability. Generally, medical applications have different kinds of...
This paper proposes a novel version of path oblivious random access memory called radix path ORAM (R-Path ORAM) with a large root (radix) bucket size but a small fixed size for all the other buckets in the tree. A detailed analysis of the root...
Phishing attacks have become the preferred vehicle to gather sensitive information as well as to deliver dangerous malware. So far, there is still no phishing detection system that can perfectly detect and progressively self adapt to differentiate...
Nowadays, Wireless Body Area Networks (WBANs) are revolutionizing the field of healthcare applications which is deeply related to human life and requires a noteworthy attention. In this medical context, reliability, energy consumption and real time...
The Micro Air Vehicle Link (MAVLink in short) is a communication protocol for unmanned systems (e.g., drones, robots). It specifies a comprehensive set of messages exchanged between unmanned systems and ground stations. This protocol is used in...
This work highlights the key factors considered to evaluate the performance of a Localization System (LS) for W SNs. Indeed, the majority of the existing works concentrated essentially on the accuracy of the estimated location by the LS and ignored...
Internet of Mobile Things (IoMT) is a new paradigm of the Internet of Things (IoT) where devices are inherently mobile. While mobility enables innovative applications and allows new services, it remains a challenging issue as it causes disconnection...
Mobility and resources optimized management are still open challenging issues for the success and proliferation of the Internet of mobile things based on the 6LowPAN technology. An efficient mobility support protocol provides a continuous seamless...
Although recursive localization approaches are efficiently used in wireless sensor networks (WSNs), their application leads to increased energy consumption caused by the important communication overhead necessary to achieve the localization task....
Operating under duty-cycle mode allows wireless sensor networks to prolong their lifetime. However, this working pattern, with the temporary unavailability of nodes, brings challenges to the network design, mainly for a fundamental service like...
In-network caching in Named Data Networking (NDN) based Internet of Things (IoT) plays a central role for efficient data dissemination. Data cached throughout the network may quickly become obsolete as they are transient and frequently updated by...
Oblivious Random-Access Memory (ORAM) is becoming a fundamental component for modern outsourced storages as a cryptographic primitive to prevent information leakage from a user access pattern. The major obstacle to its proliferation has been its...
A stochastic model is introduced that accurately models collisions in Flying Ad Hoc wireless Networks (FANETs) where Unmanned Aerial Vehicles (UAVs) are flying within the same shared 3D airspace. The model has two input parameters, the number of...
In this paper, we propose an advanced implementation of Path ORAM to hide the access pattern to outsourced data into the cloud. This implementation takes advantage of eventual data locality and popularity by introducing a small amount of extra...
The Internet of Things (IoT) ecosystem includes a plethora of devices equipped with heterogeneous communication interfaces. They exhibit different mobility patterns and hardware constraints as memory, battery and processing power. On the other hand...
In recent years, clustering has emerged as a promising approach to facilitate the data routing and data aggregation in Wireless Sensor Network (WSN).Although clustering routing approaches stand well in small-scale networks, they do not fit large...
Phishing attacks have become the preferred vehicle to gather sensitive information as well as to deliver dangerous malware. So far, there is still no phishing detection system that can perfectly detect and progressively self adapt to differentiate...
LoRaWAN is a wireless technology for Low Power Wide Area Network (LPWAN). Today, it is considered as one of the most serious alternatives for IoT thanks to its low cost, low power consumption equipments and its open business model. LoRaWAN...
Context‐awareness has recently been considered as a viable performance leverage for adapting protocols to their deployment evolving contexts. In constrained‐based Wireless Sensor Networks (WSN), context‐awareness enables sensors to learn about their...
The presence of communication obstructing entities severely degrades the routing efficiency in Mobile Ad hoc Networks (MANET). While several routing protocols have proposed ways to mitigate this degradation essentially by getting around and avoiding...
The Information-Centric Networking (ICN) paradigm is shaping the foreseen future Internet architecture by focusing on the data itself rather than its hosting location. It is a shift from a host-centric communication model to a content-centric model...
Trust establishment in vehicular ad hoc networks (VANETs) is a challenging task due essentially to the high speed of vehicles, the long distances, and the network topology dynamics. Furthermore, applications context evolves quickly at the same time...
This article describes how the named data networking (NDN) has recently received a lot of attention as a potential information-centric networking (ICN) architecture for the future Internet. The NDN paradigm has a great potential to efficiently...
This article deals with a key distribution protocol to secure routing in large-scale Wireless Sensor Networks (WSNs) and proposes a new protocol called KDSR. The authors' protocol has two originalities: to provide a secure network structure for...
The trade-off between authentication and privacy is a key security aspect in vehicular ad hoc networks (VANETs). While it is necessary to authenticate and identify each communicating vehicle, it remains mandatory to insure and maintain the privacy....
Wireless Body Area Networks are nowadays attracting both academic and industrial worlds. Combining collected data related to patient context with original health measurement can enhance the general health state monitoring and help to better...
Internet of Vehicles (IoV) constitutes an important part of the Smart Cities concept, relying on different technologies and including heterogeneous cars types, which raises challenges to ensure and preserve road safety. Throughout this paper, we...
Conflict detection is an important research issue in Unmanned Aerial Vehicles to ensure safety and collision free flights. In this paper, we first propose a comprehensive analytical framework for a three dimensional conflict detection. Then, we...
Self-organization and localization capabilities are among the most important requirements in wireless sensor networks (WSNs). While existing localization approaches mainly focus on enhancing the accuracy and minimizing the position error, particular...
VANET nodes are characterized by their high mobility and they exhibit different mobility patterns. Therefore, VANET clustering schemes should take into consideration the mobility parameters among neighboring nodes to produce relatively stable...
Localization of wireless devices is a crucial requirement for many emerging applications such as environmental monitoring, intelligent transportation, home automation, health-care monitoring, and social networking. In this letter, we propose AWL a...
Mobility and resources optimized management are still open challenging issues for the success and proliferation of the Internet of mobile things based on the 6LowPAN technology. An efficient mobility support protocol provides a continuous seamless...
Trust establishment in Vehicular Ad hoc Networks (VANETs) is a challenging task due essentially to the high speed of vehicles, the long distances and the network topology dynamics. Furthermore, applications context evolves quickly at the same time...
Although recursive localization approaches stand well in small-scale networks, they are unsuitable for largescale WSNs. Indeed, they suffer from the adverse effects of error propagation and accumulation. They also require an important communication...
The proliferation of smart devices is revolutionizing our life and work styles. Billions of physical devices or objects are envisioned to be connected. These devices will be outfitted with various kinds of sensors and actuators enabled by...
The machine-to-machine (M2M) technology, is expected to be one of the most promising revenue-generating services. However, to ensure the wide spread of this technology, M2M communications should be secure, fault-tolerant and self-managed. In this...
As the energy efficiency remains a key issue in wireless sensor networks, duty-cycled mechanisms acquired much interest due to their ability to reduce energy consumption by allowing sensor nodes to switch to the sleeping state whenever possible. The...
Information-Centric Networking (ICN) is an emerging network paradigm based on name-identified data objects and in-network caching. Therefore, ICN contents are distributed in a scalable and cost-efficient manner. With the rapid growth of IoT traffic...
To obtain a trade-off between location accuracy and implementation cost, recursive localization schemes are being pursued as a cost-effective alternative to more expensive localization approaches, where localization information increases...
Despite the fact that cooperative localization approaches stand well in Wireless Sensor Networks (WSNs), they impose challenge of increased energy consumption resulting from the important communication overhead required to accomplish the...
Delivering multimedia content, requiring high throughput and reduced end-to-end delay, is a hard task in Wireless Sensor Networks, due to the limited bandwidth and energy. Multipath routing is an attractive alternative to remedy to these constraints...
Security threats are becoming very sophisticated and pervasive everywhere. Phishing threats in particular has a changeable nature and short life cycle that complicates the detection process. In this paper, we introduce a Multi-Agent System (MAS) as...
Named Data Networking architecture originally provided consumer mobility by design, however content or producer mobility was left unspecified.  Since then a number of producer mobility support schemes have been proposed. In this paper, we provide a...
Named-Data Networking (NDN) is a promising candidate for the Internet of Things (IoT) which targets to improve data dissemination eciency. This new paradigm brings considerable benefits such as minimizing the content producer solicitation and rapid...
Many classifications techniques have been used and devised to combat phishing threats, but none of them is able to efficiently identify web phishing attacks due to the continuous change and the short life cycle of phishing websites. In this paper,...
The concept of trust in vehicular ad hoc networks (VANETs) is usually utilized to assess the trustworthiness of the received data as well as that of the sending entities. The quality of safety applications in VANETs largely depends on the...
This paper introduces an authentication protocol for vehicular communications, which uses two techniques to preserve privacy namely pseudonym and group signcryption. The main features of this protocol: Firstly, it offers conditional anonymous...
Efficient key distribution and management mechanisms as well as lightweight ciphers are the main pillar for establishing secure wireless sensor networks (WSN). Several symmetric based key distribution protocols are already proposed, but most of them...
Internet of Mobile Things (IoMT) is a new paradigm of the Internet of Things (IoT) where devices such as sensors, robots, unmanned aerial vehicles (UAV) and cars, are inherently mobile. While mobility enables innovative applications and allows new...
The host identity protocol-based (HIP) machine-to-machine (M2M) overlay network is a virtual, self-organised and secure M2M network build on the top of the internet. M2M devices forming this overlay network may change their point of attachment to...
Buffering mechanisms play a vital role in leveraging the capacity and efficiency of live streaming as well as P2P streaming system. An appropriate buffering mechanism allows the peer to undergo a smooth playback by compensating the delay introduced...
The wide proliferation of WSNs in various domains has lead to the emergence of numerous applications having all different requirements. Consequently, different approaches and communications protocols have to be developed to meet these diverse and...
The increasing use of wireless networks and the constant miniaturization of electrical invasive/non-invasive devices have empow- ered the development of Wireless Body Area Networks (WBANs). A WBAN provides a continuous health monitoring of a patient...
In Wireless Ad Hoc Networks, synchronization is a prerequisite to many basic operations such as frequency hopping, power saving, free contention channel access, clustering and security. Clock synchronization requires the availability of a common...
Context-awareness has gained an increasing popularity in ubiquitous computing environments as it allows automatic adaptation of protocols behavior according to context changes. Nowadays, wireless sensor networks (WSNs), deployed as a main appliance...
In Vehicular Ad-hoc Networks (VANETs), any vehicle uses a location service to get an up-to-date data of all vehicles’ positions in its vicinity. Many location services rely on infrastructures to perform location update and location query tasks....
This paper deals with conflict detection for Unmanned Aerial Vehicles (UAVs). We provide an exhaustive mathematical framework for 3D conflict detection and propose a novel distributed conflict detection algorithm. The suggested algorithm requires...
Sensing coverage is a fundamental issue for Wireless Sensor Networks (WSNs). Several coverage configuration protocols have been developed; most of them presume the availability of precise knowledge about each node location via GPS receivers. However...
The aim of a routing protocol is to compute routes between every couple of nodes. When the topology evolves over time, routing decisions should be constantly reconsidered to ensure continuous valid routing. Conventional proactive routing protocols...
The host identity protocol-based (HIP) machine-to-machine (M2M) overlay network is a virtual, self-organised and secure M2M network build on the top of the internet. M2M devices forming this overlay network may change their point of attachment to...
Graph coloring was exploited in wireless sensor networks to solve many optimization problems, mainly related to channel assignment. In this paper, we propose to use coloring to jointly manage channel access and routing to the sink. We introduce CHRA...
The efficiency of live Peer-to-Peer (P2P) streaming protocols depends on the appropriateness and the management abilities of their underlying overlay multicast. While a tree overlay structure confines transmission delays efficiently by maintaining...
The Machine-to-Machine (M2M) technology, currently under standardization at both the ETSI and 3GPP, is expected to be one of the most promising revenue-generating services. However, to ensure the wide spread of this technology, M2M communications...
Ad hoc wireless communications rely on beaconing to manage and maintain several network operations and to share relevant network parameters among network nodes. Beacon frames are sent at the start of each beacon interval. The frequency of beaconing...
Vehicle location information is central to many location-based services and applications in VANETs. Tracking vehicles positions and maintaining an accurate up-to-date view of the entire network are not easy due to the high mobility of vehicles and...
In this paper, we propose an Extended-LEACH protocol that integrates an efficient multi-hop routing scheme in distributed clustering algorithms. In addition to energy saving, Extended-LEACH solves the issue of isolated cluster head nodes. The latter...
Vehicle mobility in presence of obstructing obstacle is one of the main problems limiting the deployment of vehicular ad hoc networks. Indeed, in such a highly dynamic network, underlying routing protocols struggle to find valid routes towards...
Host and network mobility support mechanisms aim to provide a seamless access to Internet while end users are changing their point of attachment.When a mobile entity roams from a network to another, a handover occurs causing communication session...
Unmanned Aerial Vehicles (UAVs) have seen an important growth in variousmilitary and civilian applications including surveillance, reconnaissance, homeland security and forest fire monitoring. Currently, UAVs are limited in their access to the civil...
Information-Centric Networking (ICN) is a new paradigm proposing a shift in the main Internet architecture from a host-centric communication model to a content-centric model. ICN architectures target to meet user demands for accessing the...
Duty-cycling scheme, that consists in switching between active and sleeping modes, is widely exploited in WSNs to reduce power consumption. However, this technique raises several challenges especially for broadcast communications. In fact, as many...
Nowadays, the Peer-to-Peer (P2P) Video-on-Demand (VOD) systems knows a huge success for several reasons: a) each peer is both server and client leading to scalable system, b) it is not necessary to build and maintain infrastructures. BitTorrent is...
Many applications introduced by Vehicular Ad-Hoc Networks (VANETs), such as intelligent transportation and roadside advertisement, make VANETs become an important component of metropolitan area networks. In VANETs, mobile nodes are vehicles which...
In Wireless Sensor Networks, low latency, energy efficiency, and coverage problems are considered as three key issues in designing routing protocols. In this paper we present a new protocol called Low Energy Adaptive Tier Clustering Hierarchy (...
Machine-to-machine (M2M) communications have emerged as a cutting edge technology for next-generation communications, and are undergoing rapid development and inspiring numerous applications. Machine-to-machine (M2M) communications could enable...
A concise overview of Machine Type communication (MTC) is presented to encompass the various traffic patterns and models from the literature. Since M2M applications may well be generating huge traffic and resulting in bandwidth intensive...
The IPv4 addressing scheme, which was proposed by IETF in 1981, provides 4.3 billion unique 32-bit IP addresses but has been fully exhausted in Feb, 2011. This exhaustion of unique IP addresses poses significant challenges to the addition of new...
The presence of obstructing obstacles severely degrades the efficiency of routing protocols in MANETs. To mitigate the effect of these obstructing obstacles, routing in MANETs is usually based on the a prioriknowledge of the obstacle map. In this...