المنشورات و المؤلفات

Localization of wireless devices is a crucial requirement for many emerging applications such as environmental monitoring, intelligent transportation, home automation, health-care monitoring, and social networking. In this letter, we propose AWL a...
Mobility and resources optimized management are still open challenging issues for the success and proliferation of the Internet of mobile things based on the 6LowPAN technology. An efficient mobility support protocol provides a continuous seamless...
Trust establishment in Vehicular Ad hoc Networks (VANETs) is a challenging task due essentially to the high speed of vehicles, the long distances and the network topology dynamics. Furthermore, applications context evolves quickly at the same time...
Although recursive localization approaches stand well in small-scale networks, they are unsuitable for largescale WSNs. Indeed, they suffer from the adverse effects of error propagation and accumulation. They also require an important communication...
Conflict detection is an important research issue in Unmanned Aerial Vehicles to ensure safety and collision free flights. In this paper, we first propose a comprehensive analytical framework for a three dimensional conflict detection. Then, we...
The proliferation of smart devices is revolutionizing our life and work styles. Billions of physical devices or objects are envisioned to be connected. These devices will be outfitted with various kinds of sensors and actuators enabled by...
The machine-to-machine (M2M) technology, is expected to be one of the most promising revenue-generating services. However, to ensure the wide spread of this technology, M2M communications should be secure, fault-tolerant and self-managed. In this...
As the energy efficiency remains a key issue in wireless sensor networks, duty-cycled mechanisms acquired much interest due to their ability to reduce energy consumption by allowing sensor nodes to switch to the sleeping state whenever possible. The...
Information-Centric Networking (ICN) is an emerging network paradigm based on name-identified data objects and in-network caching. Therefore, ICN contents are distributed in a scalable and cost-efficient manner. With the rapid growth of IoT traffic...
To obtain a trade-off between location accuracy and implementation cost, recursive localization schemes are being pursued as a cost-effective alternative to more expensive localization approaches, where localization information increases...
Despite the fact that cooperative localization approaches stand well in Wireless Sensor Networks (WSNs), they impose challenge of increased energy consumption resulting from the important communication overhead required to accomplish the...
Delivering multimedia content, requiring high throughput and reduced end-to-end delay, is a hard task in Wireless Sensor Networks, due to the limited bandwidth and energy. Multipath routing is an attractive alternative to remedy to these constraints...
Security threats are becoming very sophisticated and pervasive everywhere. Phishing threats in particular has a changeable nature and short life cycle that complicates the detection process. In this paper, we introduce a Multi-Agent System (MAS) as...
Named Data Networking architecture originally provided consumer mobility by design, however content or producer mobility was left unspecified.  Since then a number of producer mobility support schemes have been proposed. In this paper, we provide a...
Named-Data Networking (NDN) is a promising candidate for the Internet of Things (IoT) which targets to improve data dissemination eciency. This new paradigm brings considerable benefits such as minimizing the content producer solicitation and rapid...
Many classifications techniques have been used and devised to combat phishing threats, but none of them is able to efficiently identify web phishing attacks due to the continuous change and the short life cycle of phishing websites. In this paper,...
The concept of trust in vehicular ad hoc networks (VANETs) is usually utilized to assess the trustworthiness of the received data as well as that of the sending entities. The quality of safety applications in VANETs largely depends on the...
This paper introduces an authentication protocol for vehicular communications, which uses two techniques to preserve privacy namely pseudonym and group signcryption. The main features of this protocol: Firstly, it offers conditional anonymous...
Efficient key distribution and management mechanisms as well as lightweight ciphers are the main pillar for establishing secure wireless sensor networks (WSN). Several symmetric based key distribution protocols are already proposed, but most of them...
Internet of Mobile Things (IoMT) is a new paradigm of the Internet of Things (IoT) where devices such as sensors, robots, unmanned aerial vehicles (UAV) and cars, are inherently mobile. While mobility enables innovative applications and allows new...
VANET nodes are characterized by their high mobility and they exhibit different mobility patterns. Therefore, VANET clustering schemes should take into consideration the mobility parameters among neighboring nodes to produce relatively stable...
Self-organization and localization capabilities are among the most important requirements in wireless sensor networks (WSNs). While existing localization approaches mainly focus on enhancing the accuracy and minimizing the position error, particular...
The host identity protocol-based (HIP) machine-to-machine (M2M) overlay network is a virtual, self-organised and secure M2M network build on the top of the internet. M2M devices forming this overlay network may change their point of attachment to...
Buffering mechanisms play a vital role in leveraging the capacity and efficiency of live streaming as well as P2P streaming system. An appropriate buffering mechanism allows the peer to undergo a smooth playback by compensating the delay introduced...
The wide proliferation of WSNs in various domains has lead to the emergence of numerous applications having all different requirements. Consequently, different approaches and communications protocols have to be developed to meet these diverse and...
The increasing use of wireless networks and the constant miniaturization of electrical invasive/non-invasive devices have empow- ered the development of Wireless Body Area Networks (WBANs). A WBAN provides a continuous health monitoring of a patient...
In Wireless Ad Hoc Networks, synchronization is a prerequisite to many basic operations such as frequency hopping, power saving, free contention channel access, clustering and security. Clock synchronization requires the availability of a common...
Context-awareness has gained an increasing popularity in ubiquitous computing environments as it allows automatic adaptation of protocols behavior according to context changes. Nowadays, wireless sensor networks (WSNs), deployed as a main appliance...
In Vehicular Ad-hoc Networks (VANETs), any vehicle uses a location service to get an up-to-date data of all vehicles’ positions in its vicinity. Many location services rely on infrastructures to perform location update and location query tasks....
This paper deals with conflict detection for Unmanned Aerial Vehicles (UAVs). We provide an exhaustive mathematical framework for 3D conflict detection and propose a novel distributed conflict detection algorithm. The suggested algorithm requires...
Sensing coverage is a fundamental issue for Wireless Sensor Networks (WSNs). Several coverage configuration protocols have been developed; most of them presume the availability of precise knowledge about each node location via GPS receivers. However...
The aim of a routing protocol is to compute routes between every couple of nodes. When the topology evolves over time, routing decisions should be constantly reconsidered to ensure continuous valid routing. Conventional proactive routing protocols...
The host identity protocol-based (HIP) machine-to-machine (M2M) overlay network is a virtual, self-organised and secure M2M network build on the top of the internet. M2M devices forming this overlay network may change their point of attachment to...
Graph coloring was exploited in wireless sensor networks to solve many optimization problems, mainly related to channel assignment. In this paper, we propose to use coloring to jointly manage channel access and routing to the sink. We introduce CHRA...
The efficiency of live Peer-to-Peer (P2P) streaming protocols depends on the appropriateness and the management abilities of their underlying overlay multicast. While a tree overlay structure confines transmission delays efficiently by maintaining...
The Machine-to-Machine (M2M) technology, currently under standardization at both the ETSI and 3GPP, is expected to be one of the most promising revenue-generating services. However, to ensure the wide spread of this technology, M2M communications...
Ad hoc wireless communications rely on beaconing to manage and maintain several network operations and to share relevant network parameters among network nodes. Beacon frames are sent at the start of each beacon interval. The frequency of beaconing...
Vehicle location information is central to many location-based services and applications in VANETs. Tracking vehicles positions and maintaining an accurate up-to-date view of the entire network are not easy due to the high mobility of vehicles and...
In this paper, we propose an Extended-LEACH protocol that integrates an efficient multi-hop routing scheme in distributed clustering algorithms. In addition to energy saving, Extended-LEACH solves the issue of isolated cluster head nodes. The latter...
Vehicle mobility in presence of obstructing obstacle is one of the main problems limiting the deployment of vehicular ad hoc networks. Indeed, in such a highly dynamic network, underlying routing protocols struggle to find valid routes towards...
Host and network mobility support mechanisms aim to provide a seamless access to Internet while end users are changing their point of attachment.When a mobile entity roams from a network to another, a handover occurs causing communication session...
Unmanned Aerial Vehicles (UAVs) have seen an important growth in variousmilitary and civilian applications including surveillance, reconnaissance, homeland security and forest fire monitoring. Currently, UAVs are limited in their access to the civil...
Information-Centric Networking (ICN) is a new paradigm proposing a shift in the main Internet architecture from a host-centric communication model to a content-centric model. ICN architectures target to meet user demands for accessing the...
Duty-cycling scheme, that consists in switching between active and sleeping modes, is widely exploited in WSNs to reduce power consumption. However, this technique raises several challenges especially for broadcast communications. In fact, as many...
Nowadays, the Peer-to-Peer (P2P) Video-on-Demand (VOD) systems knows a huge success for several reasons: a) each peer is both server and client leading to scalable system, b) it is not necessary to build and maintain infrastructures. BitTorrent is...
Many applications introduced by Vehicular Ad-Hoc Networks (VANETs), such as intelligent transportation and roadside advertisement, make VANETs become an important component of metropolitan area networks. In VANETs, mobile nodes are vehicles which...
In Wireless Sensor Networks, low latency, energy efficiency, and coverage problems are considered as three key issues in designing routing protocols. In this paper we present a new protocol called Low Energy Adaptive Tier Clustering Hierarchy (...
Machine-to-machine (M2M) communications have emerged as a cutting edge technology for next-generation communications, and are undergoing rapid development and inspiring numerous applications. Machine-to-machine (M2M) communications could enable...
A concise overview of Machine Type communication (MTC) is presented to encompass the various traffic patterns and models from the literature. Since M2M applications may well be generating huge traffic and resulting in bandwidth intensive...
The IPv4 addressing scheme, which was proposed by IETF in 1981, provides 4.3 billion unique 32-bit IP addresses but has been fully exhausted in Feb, 2011. This exhaustion of unique IP addresses poses significant challenges to the addition of new...
The presence of obstructing obstacles severely degrades the efficiency of routing protocols in MANETs. To mitigate the effect of these obstructing obstacles, routing in MANETs is usually based on the a prioriknowledge of the obstacle map. In this...