
Abdelkrim HaqiqUniversité Hassan 1er · Mathematics and Computer
Abdelkrim Haqiq
PhD (Doctorat d'Etat)
About
160
Publications
48,743
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
664
Citations
Publications
Publications (160)
Hybrid ALOHA is a novel Medium Access Control (MAC) protocol that aims to enhance energy efficiency and packet delivery performance in wireless communication networks. This paper leverages mathematical models and analysis techniques from game theory and Markov chain modeling to investigate the performance of the hybrid ALOHA protocol under cooperat...
Most wireless communication technologies addressed to the Internet of Things (IoT) applications face the bottleneck of dense and large-scale use cases. One solution to this problem is a periodic channel reservation strategy, in which only a small group of stations can compete for channel access during a given period. The IEEE 802.11ah standard, a.k...
To provide different services to smart cities, many new approaches were used, including the strategic approach and the techno-human-centric approach. When it combines both the human aspect through its sensitivities and the technical aspect of data management to enable the city's stakeholders to act better. Indeed, a new governance framework is poss...
Sustainable development commitments are of concern to the city's decision-makers as well as significantly impacting the existing transportation systems. The concept of the smart city and precisely the component of smart mobility centered on the user and soft transport comes to support this approach of transformation which aims at the low carbon cit...
In this paper, we present a new MAC (Medium Access Control) protocol, called Hybrid ALOHA (H-ALOHA), which is a combination of two existing protocols: Pure ALOHA (P-ALOHA) protocol and Slotted ALOHA (S-ALOHA) protocol. The idea behind it is to design a MAC protocol that could meet some specific requirements in wireless networks, such as reducing en...
Text classification and categorization is a hot topic that involves assigning tags or categories to a text based on its content. It is one of the important tasks of automatic natural language processing (NLP) in many applications such as topic tagging, sentiment analysis, intent detection, spam filtering, and email routing. Machine learning text cl...
Since the beginning of the COVID-19 pandemic, many countries have deployed digital contact tracing apps to help prevent the spread of the SARS-CoV-2 pandemic. Bluetooth-based smartphone contact tracing apps are considered one of the most effective measures for containing the COVID-19 pandemic and its new variants. When two app users come near each...
The IEEE 802.11ah standard, marketed as Wi-Fi Halow, introduces a new channel access mechanism called the Restricted Access Window (RAW), aiming to provide connectivity for the Internet of Things (IoT) applications over broad areas. RAW aspires to alleviate the contention by splitting the channel access into periods and allocating each period to a...
Machine learning is one of the technologies coming to help the deployment of smart cities in all phases. The diagnosis is a crucial phase that comes to ensure the implementation of a project adapted to the reality of the city diagnosed; this step requires a significant financial commitment. This paper comes to deploy a frugal diagnostic approach of...
IEEE 802.11ah is a new Wi-Fi standard for sub-1Ghz communications, aiming to address the challenges of the Internet of Things (IoT). Significant changes in the legacy 802.11 standards have been proposed to improve the network performance in high contention scenarios, the most important of which is the Restricted Access Window (RAW) mechanism. This...
Machine learning will be a technology that will greatly aid in the deployment of future smart cities in all these phases. Some complex problems can be difficult to understand or completely incomprehensible and can be difficult to solve using traditional machine learning approaches due to the lack of data on the problem. Therefore, there is a need f...
This paper introduces a general stochastic game analysis of a network scenario consisting of a mix of cooperative and non-cooperative players (i.e., users) under incomplete game information. Users access a shared channel using the Slotted ALOHA mechanism combined with ZigZag Decoding (SAZD). Cooperative players seek to optimize the global utility o...
Nowadays, the world is betting on mobile phone applications to stop the spread of deadly infectious diseases, including the COVID-19 pandemic and its new variants. Since the beginning of the COVID-19 outbreak, a group of countries has launched contact-tracing apps to stem the spread of COVID-19. The app helps health authorities to track the movemen...
Software defined networking-based cloud has many advantages over traditional network infrastructure, such as improved network flexibility, programmability, and scalability. However, new security concerns and especially new trends of Distributed Denial of Service (DDoS) attacks have been introduced during the integration of Software Defined Networki...
The use of mobile cellular communication is growing all over the world, with the increasing popularity of mobile devices. Fifth Generation (5G) has recently emerged to satisfy the increasing demand for high data bit rates, to maintain network connectivity every time and everywhere, opening the possibility of connecting all the devices in the networ...
The development of smart cities requires a global reflection that takes into account all the concerns of the smart city. With urban sprawl and other urban planning phenomena, it is crucial to identify appropriate and frugal assessment methodologies. This paper originally comes to assess the maturity of local regulation with respect to the smart cit...
In this paper, we propose a novel pricing mechanism to enhance the performance of the Slotted ALOHA mechanism combined with ZigZag Decoding (SA-ZD). We model the system using a stochastic game approach where the game state is given as a Markov process. We assume a cooperative game framework where users seek to optimize the same utility function. In...
The COVID-19 pandemic has spread with alarming speed and resulted in substantial loss of lives. In the COVID-19 pandemic response, the Internet of Things (IoT) technology provides an extensive integrated network of IoT devices to prevent the spread of contagion. Rapid access of the data transmitted by COVID-19 IoT devices simply means better decisi...
In wireless environments, simultaneous data transmissions over the same wireless channel lead to the collision problems, which may cause data loss. As a result, the performance of the random access (RA) mechanisms like the Slotted ALOHA is degraded dramatically. Lately, both Capture Effect (CE) and ZigZag Decoding (ZD) techniques have contributed t...
Nowadays, the Internet of things (IoT) is becoming a technological revolution due to the increasing amount of connected devices. One of the most successful technologies providing the wireless interconnection of the IoT devices is the long-range (LoRa) technology. However, to achieve the massive connectivity of LoRa, it is important to deal with tra...
Information from COVID-19 IoT (Internet of Things) devices is greatly important when it is fresh. However, the packets’ collision problem slows down the speed at which this information reaches, resulting in a wider spread of the virus. In this paper, we address this challenge by giving priority to COVID-19 IoT devices over consumer IoT devices. We...
In this work, we investigate the impact of the transmission cost on the cooperative Slotted ALOHA mechanism combined with ZigZag decoding (SA-ZD). In our previous work, the cooperative SA-ZD was analyzed under the assumption of cost-free transmissions. However, this assumption is not always held since nodes are usually battery-powered devices. Ther...
The SDN controller is the core of the software-defined network (SDN), which provides important network operations that need to be protected from all types of threats. Many researchers have been focusing on different layers of security regarding the SDN controller such as Anti-DDOS system or enforcement of TLS connection between the controller and t...
Since the introduction of the original IEEE 802.11 medium access mechanism, the definition of the multicast access mechanism has been the subject of numerous amendments and standardization efforts. Over the past few years, the need for a reliable multicast mechanism has been spurred due to the increasing demand for audio/video services. It is widel...
With the development of society and its people democratic consciousness, voting as a crucial canal of democracy has to satisfy high expectations of modern society, new technologies and techniques must be deployed for better voting experience, and to replace traditional cost inefficient and laborious traditional paper voting. Blockchain technology i...
The Fifth Generation of Mobile Networks (5G) is changing the cellular network infrastructure paradigm, and small cells are a key piece of this shift. But the high number of small cells and their low coverage involve more Handovers to provide continuous connectivity, and the selection, quickly and at low energy cost, of the appropriate one in the vi...
p>The Fifth Generation of Mobile Networks (5G) is changing the cellular network infrastructure paradigm, and Small Cells are a key piece of this shift. But the high number of Small Cells and their low coverage involve more Handovers to provide continuous connectivity, and the selection, quickly and at low energy cost, of the appropriate one in the...
In a complex network as a cloud computing environment, security is becoming increasingly based on deception techniques. To date, the static nature of cyber networks offers to adversaries good opportunities to systematically study the network environment, launch a cyber-attack effortlessly and wide-spread and finally defeat the target system. In ord...
Distributed denial of service (DDoS) attacks which
have been completely covered by the security community, today
pose a potential new menace in the software defined networks
(SDN) architecture. For example, the disruption of the SDN
controller could interrupt data communication in the whole SDN
network. DDoS attacks can produce a great number of ne...
The book aims to promote high-quality research by bringing together researchers and experts in cyber-physical system security and privacy from around the world to share their knowledge of the different aspects of CPS security and we have integrated these chapters into a comprehensive book. This book will present the state of the art and state of pr...
Wireless jamming attacks have recently been a subject of several researches, due to the exposed nature of the wireless medium. This paper studies the anti-jamming resistance in the presence of several attackers. Two kind of jammers are considered, smart jammers which have the ability to sense the legitimate signal power and regular jammers which do...
Cyber-Physical Cloud Computing (CPCC) combines scalable sensors, software-
based processing and control, and data services by integrating physical systems
with cloud computing. CPCC has been widely adopted due to its benefits including
resource use efficiency, smart adaptation, scalability, etc... As cloud adoption
grows, the service provider and e...
Among the most critical issues in VANETare the frequent failures of the route caused by the high mobility of vehicles, the increase of the network overload caused by control messages, and the increase of the data packet delivery time. Short communication route lifetime often breaks down during data packet transmission between the source and the des...
Good governance of information systems is a guarantee of an optimal contribution of these systems to the overall performance of an organizational being. The aim is to ensure that the information system in action is well managed and that it meets the expectations of the various internal and external stakeholders. The governance of information system...
Jamming mitigation as a means to countermeasure jamming attacks has recently been a subject to several research. Since the battery life is indeed important in any wireless system, and as it's directly related with the transmission activity, this paper proposes a Pricing Wireless Random Channel Access (P-WRCA) mechanism and compares it with the Wire...
Due to the broadcast nature of the wireless medium, mechanisms are needed to deal with the problem of jamming attacks. This paper proposes a Large Anti-Jamming Cooperation scheme, in which, several anti-jammers are considered to help a secondary user sending signal to the receiver side in the presence of smart jamming attacks. A hierarchical behavi...
Distributed Denial of Service (DDOS) is one of the most common threats that is growing in size and frequency in cloud computing environments due to its significant features. The good capacities of software-defined networking (SDN) (e.g. traffic examination based on software, centralized control and dynamic network reconfiguration) offer us new oppo...
One of the most critical issues of VANET is the frequent failure of the route caused by the high mobility of vehicles. Short communication route lifetime often breaks down in progress data packet transmission between the source and the destination vehicles, and launches a new route reconstruction that becomes more frequent and depletes a significan...
This article describes how the landscape of higher education in Morocco has undergone several changes in its organization; hence universities are called upon to strengthen their modes of governance by using new technologies as communication management devices. At the same time, and in a national context of sustainable development, universities are...
Due to the broadcast nature of the shared medium,
wireless communications become more vulnerable to malicious
attacks. In this paper, we tackle the problem of jamming in
wireless network when the transmission of the jammer and
the transmitter occur with a non-zero cost. We focus on a
jammer who keeps track of the re-transmission attempts of
the pac...
This article describes how currently, service level agreements (SLAs) assurance forms one of the major challenges for cloud computing (CC) in order to guarantee quality of service (QoS) in real-time and control SLA violations. However, due to the highly dynamic nature of this open environment, it is important to have a binding agreement between all...
This paper investigates the impact of transmission cost on stimulating the cooperation in decentralized Slotted ALOHA mechanism combined with ZigZag Decoding (SA-ZD). We model the system by a bi-dimensional Markov chain that integrates the effect of ZigZag Decoding (ZD), then we formulate the problem within a stochastic game framework. We evaluate...
One of the critical problems in VANET is the frequent breakdown of the path caused by the high mobility of vehicles. For this purpose, much searches has disclosed the route lifetime between source and destination vehicles as an important factor to improve the quality of service in the VANET network. Each solution propose his own technique to determ...
In Cloud Computing environment, the availability, authentication and integrity became a more challenging problem. Indeed, the classical solutions of security based on intrusion detection system and firewalls are easily bypassed by experienced attackers. In addition, the use of different technologies in term of security didn’t mitigate the attack co...
QoS management is a crucial task in wireless networks. Continuous Markov chain is highly significant suitable model for resources management in wireless networks. In this paper, we propose a Continuous Markov chain, to evaluate the performance of Slotted ALOHA protocol implemented in wireless networks. The analysis has been done in two times, and w...
As an important Cloud feature, security assessment has attracted massive attention in the recent years. However, the broad adoption of Cloud computing and its fast growth are raising critical scalability issues for security assessment frameworks. In this work, we addressed the scalability issue from different perspectives. First, we suggested a dec...
Network Intrusion Detection and Prevention Systems (NIDPS) are widely used to detect and thwart malicious activities and attacks. However, the existing NIDPS are monolithic/centralized, and hence they are very limited in terms of scalability and responsiveness. In this work, we address how to mitigate SYN Flooding attacks that can occur in the mana...
Moving Target Defense (MTD) has emerged as a good solution to deal with dynamic attack surface. The goal is to make it difficult for an attacker to exploit network resources. But it is challenging to provide zero downtime guarantees when performing network rearrangement or when a physical host acts as a single point of failure for virtual servers....
Due to its fast growth, Cloud computing is a quick evolving research area. Security, which is among the most required Cloud features, is a very hard and challenging task when it’s addressed for large networked systems. To automate security assessment, one should use an Attack Representation Model (ARM), such as Attack Graph (AG) or Attack Tree, to...
Cloud Data Center (CDC) security remains a major challenge for business organizations and takes an important concern with research works. The attacker purpose is to guarantee the service unavailability and maximize the financial loss costs. As a result, Distributed Denial of Service (DDoS) attacks have appeared as the most popular attack. The main...
Intrusion Detection Systems allow detection of unwanted attempts accessing which can violate security policy, manipulation or disabling of computer systems through the Internet. IDS plays a vital role in securing cloud data centers. This paper introduces an analytical model based on embedded Markov chain to analyze the packet processing using Bro I...
With the promises of predictive analytics in big data, and the use of machine learning algorithms,
predicting future is no longer a difficult task, especially for health sector, that has witnessed a great
evolution following the development of new computer technologies that gave birth to multiple fields of
research. Many efforts are done to cope wi...
The health sector has witnessed a great evolution f
ollowing the development of new computer
technologies, and that pushed this area to produce
more medical data, which gave birth to
multiple fields of research. Many efforts are done
to cope with the explosion of medical data on
one hand, and to obtain useful knowledge from it on
the other han...
The next-generation 5G networks will integrate two technologies, cognitive radio and cooperative communication, which use radio spectrum opportunistically and efficiently. In addition, they enhance the reliability and the capacity of the system. In this paper, we present a novel power control scheme based on a relaxed constraint in cognitive networ...
Network wide broadcasting in IEEE 802.11s based wireless mesh network provides a considerable amount of broadcast traffic that may lead to the broadcast storm problem and consequently degrade the network performance. Contention, collisions and redundancy are features of the broadcast storm problem that may hinder the transmission of unicast data pa...
The actual tendency of the computing networks requires supplying to the clients a permanent connection to the internet in a wireless manner. The wireless mesh network technology WMN came up to answer these priority needs, it also allows extending the network coverage with a less expensive infrastructure. The performance of all the network technolog...
The complex data transfer applications, such as the telephony, video on demand and multimedia conferencing, have become a fundamental requirement. The aim of these applications is to accelerate the information transfer as audio and image packets flows format, comparing to other data formats. The architecture of services' differentiation was suggest...
Cognitive radio is a promising technology that uses radio spectrum opportunistically and efficiently. In this paper, we present the performance of ‘Always transmit’ strategy, which consists of allowing the cognitive source to transmit over all time slots and in any time slot. Thus, the cognitive source will be able to operate continuously whenever...
Cognitive radio is a promising technology that uses radio spectrum opportunistically and efficiently. In this paper, we propose a general scheme for enhancing the cognitive sources of data transmission and improving the spectrum efficiency to provide "Always Transmit" solution using both underlay and interweave approaches. In addition, the help of...
Since security is increasingly the principal concern in the conception and implementation of software systems, it is very important that the security mechanisms are designed so as to protect the computer systems against cyber attacks. An Intrusion Tolerance Systems play a crucial role in maintaining the service continuity and enhancing the security...
Security assessment and mitigation have gained considerable attention over the recent years according to the information technology evolution and its broad adoption. Organizations are more aware of their data security, and they also have become more exigent in terms of extensibility and flexibility of their Information Technology infrastructures. C...
It is important to protect a Cloud Data Center even if there are attacks by an adversary. In order to improve the security of a Cloud Data Center (CDC) in particular, system availability, a proactive approach named SCIT (Self-Cleansing Intrusion Tolerance) may be adopted to the CDC. In this paper, we present a general analytic model of the SCIT app...