Yacine Ghamri-Doudane

Université de La Rochelle, La Rochelle, Poitou-Charentes, France

Are you Yacine Ghamri-Doudane?

Claim your profile

Publications (107)26.58 Total impact

  • Safa Hamdoun · Abderrezak Rachedi · Yacine Ghamri-Doudane
  • Camila Oliveira · Yacine Ghamri-Doudane · Carlos E. F. Brito · Stéphane Lohier
    The Twentieth IEEE Symposium on Computers and Communications (ISCC); 07/2015
  • Samira Chouikhi · Inès El Korbi · Yacine Ghamri-Doudane · Leila Azouz Saidane
    [Show abstract] [Hide abstract]
    ABSTRACT: Fault tolerance is one of the most important wireless sensor networks requirements. It ensures that the network continue to function correctly even when some components fail. In fact, fault tolerance is a need in this type of networks due to sensor node characteristics, radio communications and hostile environments in which these networks are deployed. In this survey, we give an overview of WSN mechanisms that provide or improve the fault tolerance property of wireless sensor networks. However, the different solutions presented in this survey are not only intended to mechanisms dedicated to fault tolerance, but they also include all the mechanisms allowing the prevention of fault occurrence such as energy aware routing and data aggregation & compression. Besides the classification of fault tolerance mechanisms according to the tasks they target (data management, flow management), we also propose a new classification based on the network size, since the performance of the majority mechanisms depends on the size in terms of geographical area and number of nodes. Thus, a well performing protocol conceived for small networks may be inadequate for large networks and vice versa.
    Computer Communications 06/2015; DOI:10.1016/j.comcom.2015.05.007 · 1.35 Impact Factor
  • Adriana Hava · Yacine Ghamri-Doudane · Gabriel-Miro Muntean · John Murphy
    [Show abstract] [Hide abstract]
    ABSTRACT: Wireless mesh networks (WMNs) are becoming increasingly popular mostly due to their deployment flexibility. The main drawback of these networks is their lack of guaranteeing high Quality of Service (QoS) levels to their clients. The latest ubiquitous mobile and wireless support and significant growth in smartphone features have fueled user demand for rich media services on their devices. Unfortunately, this traffic increase puts additional pressure on WMN resources, eventually affecting user QoS levels and providing solutions to address this is highly challenging. This paper shows how by using ViLBaS, an innovative selective load balancing solution for video deliveries in WMN, increased QoS levels of remotely transmitted video are obtained. ViLBaS employs distributed monitoring of network traffic, identifies the node most affected by congestion and prevents imminent packet drops by rerouting the video flows around the congested node. A hybrid simulation-emulation-based test-bed is built and used for assessing ViLBaS performance in comparison with classic solutions employing the best-known routing metrics. Real video traffic was transmitted from a sever to a client over a WMN topology and the received video quality was assessed in different scenarios. The results demonstrate that ViLBaS outperforms all other solutions when delivering various video content with diverse characteristics and at different quality levels.
    IEEE Transactions on Broadcasting 06/2015; 61(2):1-1. DOI:10.1109/TBC.2015.2400811 · 2.65 Impact Factor
  • Source
    Vinícius F S Mota · Daniel F Macedo · Yacine Ghamri-Doudane · José Marcos
    [Show abstract] [Hide abstract]
    ABSTRACT: In the recent years, the research community has proposed several protocols and applications for opportunistic networking. These protocols require that all users are willing to cooperate with the network. However, users could have selfish behavior, which can lead to degradations in the network performance. In this work, we propose an incentive mechanism to improve routing, called MINEIRO, which aims to detect and avoid selfish nodes based on the source of the messages. We demonstrate that our algorithm leads to bayeasian equilibrium. Moreover, we analyzed the impact of selfishness in opportunistic networks and showed that without an incentive mechanism, the delivery ratio is constant for up to 60% of nodes with selfish behavior in a network with random node mobility. Meanwhile, our proposal incentivizes rational users to forward messages regardless of the amount of selfish nodes. Resumo. Nosúltimos anos, a comunidade científica propôs diversos protocolos e aplicativos para redes oportunísticas. Estes protocolos requerem que todos os usuários estejam dispostos a cooperar com a rede. No entanto, os usuários podem ter comportamento egoísta, o que pode afetar o desempenho da rede. Neste trabalho, propomos um mecanismo de incentivo para melhoria do rote-amento em redes oportunísticas, chamado MINEIRO, que tem como objetivo detectar e evitar os nós egoístas com base na origem das mensagens recebi-das. O MINEIRO utiliza apenas informações locais. Demonstramos sob quais condições nosso algoritmo atinge o equilíbrio bayesiano em um jogo dinâmico. Além disso, analisamos o impacto do egoísmo em redes oportunísticas e mos-tramos que, sem nenhum mecanismo, a taxa de entregá e constante para até 60% de nós com comportamento egoísta em redes com mobilidade aleatória. Nossa proposta, por sua vez, incentiva os usuários racionais a encaminharem mensagens em qualquer quantidade de nós egoístas. * Os autores gostariam de agradecerà CAPES, COFECUB, CNPq e FAPEMIG pelo apoio financeiro parcial a este trabalho.
    Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC), Vitória - Espirito Santos; 05/2015
  • Source
    Adyson M. Maia · Dario Vieira · Miguel F. de Castro · Yacine Ghamri-Doudane
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper proposes a mechanism for uplink packet scheduler in LTE network in the context of Machine-to-Machine (M2M) communication. The proposed approach uses the current and past information of the system to satisfy the Quality of Service (QoS) requirements, to ensure fairness in resource allocation and to control the congestion caused by M2M devices. We carried out some network simulations by using a NS-3 simulator so as to show the effectiveness of the proposed approach. The results indicate that our solution can reduce the impact of M2M communication on Human-to-Human (H2H) communication and avoid the problem of starvation, when compared to related approaches.
    GLOBECOM 2014; 12/2014
  • Source
    Dataset: OaaS
    Sylvain Cherrier · Yacine M Ghamri-Doudane
  • Source
    Nadia Haddadou · Abderrezak Rachedi · Yacine Ghamri-doudane
    [Show abstract] [Hide abstract]
    ABSTRACT: In collaborative wireless networks with a low infrastructure, the presence of misbehaving nodes can have a negative impact on network performance. In particular, we are interested in dealing with this nasty presence in road safety applications, based on Vehicular Ad hoc Networks (VANETs). Because of its characteristics, namely high mobility, frequent topology changes, and large deployment areas, verifying safety data validity is difficult, and existing solutions to tackle this issue are inefficient in VANETs. In this work, we consider as harmful the presence of malicious nodes, which spread false and forged data; and selfish nodes, which cooperate only for their own benefit. To deal with this, we propose DTM2, a Distributed Trust Model, adapted from the Job Market Signaling Model. DTM2 is based on allocating credits to nodes and securely managing these credits. To motivate selfish nodes to cooperate more, our solution establishes the cost of reception to access data, forcing them to earn credits. Moreover, to detect and exclude malicious nodes, DTM2 requires the cost of sending, using signaling values inspired form economics and based on the node’s behavior, so that the more a node is malicious, the higher its sending cost, thus limiting their participation in the network. Similarly, rewards are given to nodes whose sent messages are considered as truthful, and that paid a sending cost considered as correct. The latter is a guarantee for the receivers about the truthfulness of the message since, in case of message refusal, the source node is not rewarded despite its payment. We validated DTM2 via a theoretical study using Markov chains; and with a set of simulations, in both urban and highway scenarios. Both theoretical and simulation results show that DTM2 excludes from the network 100% of malicious nodes, without causing any false positive detection. Moreover, our solution guarantees a good ratio of reception even in the presence of selfish nodes.
    IEEE Transactions on Vehicular Technology 09/2014; DOI:10.1109/TVT.2014.2360883 · 2.64 Impact Factor
  • Source
    Sylvain Cherrier · Yacine M Ghamri-Doudane
    [Show abstract] [Hide abstract]
    ABSTRACT: The increasing interest about the Internet of Things (IoT) is almost as remarkable than its practical absence in our everyday lives. Announced as the new breakthrough in IT industry, the domain is characterized by a large number of architecture propositions that are in charge of providing a structure for applications creation. These architectures are needed because of the heterogeneity of stakeholders involved in IoT Applications. Programming languages, operating systems, hardware specificities, processing power, memory, network organization, characteristics, constraints, the world of IoT is so diverse. Furthermore, these architectures should provide an easy access to users that are not aware of IT technologies involved. The Services Oriented Computing (SOC) has shown in the past its relevance to the decoupling constraints interoper-ability among stakeholders. The composition of loosely coupled services facilitates the integration of very varied elements and provides agility in the creation of new applications. But unlike the approach inherited from the SOC in pre-existing services are composed to obtain a specific application, we propose a more dynamic notion of service. Our "Object-as-a-Service" point of view is based on the notion of building dynamically the service needed on each Object and then integrate it in the whole composition. This paper focus on the gain of this approach for the IoT by promoting the "Object-as-a-Service" paradigm as a basis for the creation of dynamic and agile user-made applications. I. INTRODUCTION With the spread of wireless communications and the rise of the number of devices capable of processing data, the idea of connecting everything to everything, through the universal medium offered by the Internet, opens the way to a new era in the computing domain, usually called the "Internet of Things". The "Major trends in computing", as defined by M. Weiser [31] has occurred. At the beginning, the "mainframe" era (one computer for many users), followed by the "personal" era (one computer for one person), we are now entering the "ubiquitous" computing era (many computers for one user). Desktop computers, laptops, but also smartphones, palm, internet Boxes, and now connected TVs, household appliances, phydgets, single-board micro-computers, we are surrounded by "intelligent" objects, able to process data, communicating through networks, and hav-ing new capabilities of sensing or acting on the real world. The main idea of the Internet of Things is to expand the network, extending it into houses, buildings (walls, floor, windows, doors, etc.) and cities (car park, traffic light, lights, etc.). After its connection to offices, then homes, the Internet
    Global Information Infrastructure and Networking Symposium - GIIS 2014 -, Montréal; 09/2014
  • Source
    D Sadoun · C Dubois · Y Ghamri-Doudane · B Grau
    [Show abstract] [Hide abstract]
    ABSTRACT: The development of a system is usually based on shared and accepted require-ments. Hence, to be largely understood by the stakeholders, requirements are often written in natural language (NL). However, checking requirements completeness and consistency requires having them in a formal form. In this article, we focus on user requirements describing a system behaviour, i.e. its behavioural rules. We show how to transform behavioural rules identified from NL requirements and represented within an OWL ontology into the formal specification language Maude. The OWL ontology represents the generic behaviour of a system and al-low us to bridge the gap between informal and formal languages and to automate the transformation of NL rules into a Maude specification.
    RuleML 2014, Prague, Tcheque republic; 08/2014
  • Source
    Sylvain Cherrier · Yacine M Ghamri-Doudane · Stéphane Lohier · Gilles Roussel
    [Show abstract] [Hide abstract]
    ABSTRACT: Facilitating the creation of Internet of Things (IoT) applications is a major concern to increase its de-velopment. D-LITe, our previous work, is a framework for that purpose. In D-LITe, Objects are considered as part of a whole application. They offer a REST web service that describes Object capabilities, receives the logic to be executed, and interacts with other stakeholders. Then, the complete application is seen as a choreography dynamically deployed on various objects. But the main issue of choreographies is the loss of coherence. Because of their unreliability, some networks used in IoT may introduce de-synchronization between Objects, leading to errors and failures. In this paper, we propose a solution to re-introduce coherence in the application, in order to keep the advantages of choreography while dealing with this main issue. An overlay of logical check-points at the application layer defines links between the coherent states of a set of objects and triggers re-synchronization messages. Correcting statements are thus spread through the network, which enables fault recovery in Choreographies. This paper ends with a comparison between the checking cost and the reliability improvement.
    wf-iot; 03/2014
  • Source
    Sylvain Cherrier · Ismail Salhi · Yacine M. Ghamri-Doudane · Stéphane Lohier · Philippe Valembois
    [Show abstract] [Hide abstract]
    ABSTRACT: Service Oriented Computing (SOC) is a common way to build applications/services by composing distributed bricks of logic. Recently, the SOC paradigm has been considered for the design and implementation of Internet of Things (IoT) applications by abstracting objects as service providers or consumers. Based on this trend, we proposed in a previous work D-LITe: a lightweight RESTful virtual machine that allows ubiquitous logic description and deployment for IoT applications using Finite State Transducers (FST). Though D-LITe allows faster and more efficient application creation for heterogeneous objects, it turns out that FST design can be fastidious for inexperienced users. With that in mind, we propose in this paper BeC 3 (Behaviour Crowd Centric Composition) an innovative crowd centric architecture, grounded on D-LITe. It provides a simpler way to compose interactions between IoT components. The idea is to reverse the bottom-up approach of SOC by a rather top-down vision in which the user expresses the expected result of his application by composing behaviours that are proposed by contributors. These behaviours are deployed on each concerned component, which then act exactly as needed to fulfil their role in the composition. The crowd-Centric aspect of this platform allows a community-based design, granting a wide panel of modular and incremental interactions for a wide variety of components. Eventually, BeC 3 will give inexperienced users the ability to organise, interconnect and compose both state of the art web-services and IoT components to create interactive 2.0-like applications for the IoT.
    Mobile Networks and Applications 02/2014; 19(1):18-32. DOI:10.1007/s11036-013-0481-8 · 1.50 Impact Factor
  • Source
    Adyson M. Maia · Dario Vieira · Miguel F. de Castro · Yacine Ghamri-Doudane
    [Show abstract] [Hide abstract]
    ABSTRACT: The Long Term Evolution (LTE) standard is one of the most promising technologies of wireless network for the development of Machine-to-Machine (M2M) communication because of its high data rates, low latency, high flexibility and low cost. However, improvements are needed in the network to support the uplink-heavy traffic generated by M2M communication and also to ensure the diversity of service requirements of this communication. The uplink packet scheduler is included in the necessary improvements. In this article, we evaluate the performance of the main schedulers for M2M communication regarding the aspects of service requirements, fairness, energy efficiency and impact on the system performance of current LTE traffic.
    Wireless Days; 01/2014
  • Source
    Adyson M. Maia · Miguel F. de Castro · Dario Vieira · Yacine Ghamri-Doudane
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper proposes a mechanism for uplink packet scheduler in LTE network in the context of Machine-to-Machine (M2M) communications that uses the current and past information of the system to satisfy the Quality of Service (QoS) requirements, ensure fairness in the allocation of resources and control the congestion caused by the M2M devices. The results indicate that the proposed approach can reduce the impact of M2M communication on the Human-to- Human (H2H) communication and avoid the problem of starvation.
    32º Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos – SBRC 2014; 01/2014
  • Source
    Driss Sadoun · Catherine Dubois · Yacine Ghamri-Doudane · Brigitte Grau
    [Show abstract] [Hide abstract]
    ABSTRACT: In order to check requirement specifications written in natural language, we have chosen to model domain knowledge through an ontology and to formally represent user requirements by its population. Our approach of ontology population focuses on instance property identification from texts. We do so using extraction rules automatically acquired from a training corpus and a bootstrapping terminology. These rules aim at identifying instance property mentions represented by triples of terms, using lexical, syntactic and semantic levels of analysis. They are generated from recurrent syntactic paths between terms denoting instances of concepts and properties. We show how focusing on instance property identification allows us to precisely identify concept instances explicitly or implicitly mentioned in texts.
    2013 IEEE 25th International Conference on Tools with Artificial Intelligence (ICTAI); 11/2013
  • Marwane Ayaida · Hacene Fouchal · Yacine Ghamri-Doudane · Lissan Afilal
    [Show abstract] [Hide abstract]
    ABSTRACT: The high node mobility in Vehicular Ad-hoc Networks (VANETs) leads to frequent topology changes and link breaks. Geographic routing protocols are more suitable for these networks where the use of position-to-position paradigm to forward data. We need to know the destination position usually given by an external service denoted as a location-based service. However, geographic routing protocols and location-based services are often implemented separately and are not gathered. In this paper, we discuss a coupling mechanism of geographic routing protocols and hierarchical location-based services. We have implemented this mechanism under the NS-2 simulator. We have shown the reduction of the location-based service overhead. In the meantime, the packet delivery ratio and the average end-to-end delay have been improved.
    Broadband and Wireless Computing, Communication and Applications (BWCCA), 2013 Eighth International Conference on; 10/2013
  • Source
    Cristian Olariu · John Fitzpatrick · Yacine Ghamri-Doudane · Liam Murphy
    [Show abstract] [Hide abstract]
    ABSTRACT: The primary contribution of this paper is the design of a novel architecture and mechanisms to enable voice services to be deployed over femtocells backhauled using a wireless mesh network. The architecture combines three mechanisms designed to improve Voice Over IP (VoIP) call quality and capacity in a deployment comprised of meshed-femtocells backhauled over a WiFi-based Wireless Mesh Network (WMN), or femto-over-mesh. The three mechanisms are: (i) a Call Admission Control (CAC) mechanism employed to protect the network against congestion; (ii) the frame aggregation feature of the 802.11e protocol which allows multiple smaller frames to be aggregated into a single larger frame; and (iii) a novel delay-piggy-backing mechanism with two key benefits: prioritizing delayed packets over less delayed packets, and enabling the measurement of voice call quality at intermediate network nodes rather than just at the path end-points. The results show that the combination of the three mechanisms improves the system capacity for high quality voice calls while preventing the network from accepting calls which would result in call quality degradation across all calls, and while maximizing the call capacity available with a given set of network resources.
    2013 IEEE 24th International Symposium on Personal, Indoor and Mobile Radio Communications: Mobile and Wireless Networks (PIMRC'13 - Mobile and Wireless Networks); 09/2013
  • Nour Kouzayha · Nada Chendeb Taher · Yacine Ghamri-Doudane
    [Show abstract] [Hide abstract]
    ABSTRACT: Machine Type Communication (MTC) is an essential service for next generation cellular networks. Because of the massive number of communicating devices, MTC poses great challenges for Radio Access Network (RAN). This is mainly caused by the overloading problem that has been aggressively addressed by 3GPP as an essential working item. Because of this overloading problem, classical Human to Human (H2H) communications may be negatively affected. In this paper we first introduce the MTC and its challenges with a focus on its use in the healthcare domain. The Random Access procedure (RACH) used in Long Term Evolution (LTE) cellular networks will be then explained in order to address the issue of RACH overload coming from massive number of MTC devices. To resolve RAN overload, 3GPP and others have proposed several RAN solutions. We evaluate and compare these solutions and conclude finally with their advantages and weaknesses in order to select the best solution for an operator.
    2013 2nd International Conference on Advances in Biomedical Engineering (ICABME); 09/2013
  • Adriana Hava · G.-M. Muntean · Yacine Ghamri-Doudane · John Murphy
    [Show abstract] [Hide abstract]
    ABSTRACT: Wireless Mesh Networks (WMNs) are becoming increasingly popular and user demand for high-quality rich media services is continuously growing. Despite the fact that WMNs offer significant flexibility, they suffer in respect to Quality of Service (QoS) provisioning. This paper proposes a novel mechanism for providing enhanced QoS support to video services in multi-hop WMNs. The mechanism makes use of an innovative hybrid hierarchical architecture which combines centralized and distributed approaches. The proposed solution relies on performance monitoring at WMN nodes and performs load balancing by off-loading traffic from the highest loaded nodes to less loaded neighbours. Simulation-based results presented outline the performance of our proposed mechanism in terms of QoS metrics (delay, throughput, packet losses and PSNR) in different network load scenarios. The results clearly demonstrate how our proposed mechanism outperforms the traditional OLSR protocol in terms of QoS performance.
    High Performance Switching and Routing (HPSR), 2013 IEEE 14th International Conference on; 07/2013
  • Inès El Korbi · Yacine Ghamri-Doudane · Rimel Jazi · L.A. Saidane
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we propose a new approach to ensure fault tolerance in wireless sensor networks (WSNs) while guaranteeing both coverage and connectivity in the network. Hence after reviewing the fault tolerance related works in wireless sensor networks and enumerating the requirements that must be satisfied by our fault tolerance solution, we present the different mechanisms we propose to maintain both coverage and connectivity in the network in the case of node failure. Our approach is a proactive one in the sense that it aims to replace the “up to fail” node before its defection. In the case of impossible replacement of the “up to fail” node, a fast rerouting mechanism is proposed to forward the traffic initially routed via the “up to fail” node. Performance evaluation of our fault tolerance approach shows that the number of nodes potentially eligible for the “up to fail” node replacement depends on a threshold about the node redundancy as well as the network density metric. Moreover, we show that, compared to a classical routing algorithm, our fast rerouting mechanism reduces the packet loss rate in the network.
    Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International; 07/2013

Publication Stats

627 Citations
26.58 Total Impact Points

Institutions

  • 2013–2015
    • Université de La Rochelle
      La Rochelle, Poitou-Charentes, France
    • Université de Reims Champagne-Ardenne
      Rheims, Champagne-Ardenne, France
  • 2011–2014
    • University of Paris-Est
      • Laboratoire d'Informatique Gaspard-Monge UMR 8049 CNRS (LIGM)
      Centre, France
    • École Nationale Supérieure d’Informatique pour l’Industrie et l’entreprise
      Évry-Petit-Bourg, Île-de-France, France
  • 2006–2013
    • Université Paris-Est Marne-la-Vallée
      Champs, Île-de-France, France
    • Institut de France
      Lutetia Parisorum, Île-de-France, France
  • 2012
    • École Nationale Supérieure d'Informatique et de Mathématiques
      Grenoble, Rhône-Alpes, France
  • 2009
    • Orange Labs
      Rhône-Alpes, France
  • 2005–2008
    • Université d'Évry-Val-d'Essonne
      Évry-Petit-Bourg, Île-de-France, France
  • 2006–2007
    • France Télécom
      Lutetia Parisorum, Île-de-France, France
  • 2004–2006
    • Pierre and Marie Curie University - Paris 6
      • Laboratoire d'informatique de Paris 6 (LIP6)
      Lutetia Parisorum, Île-de-France, France