Abderrahim Benslimane

Abderrahim Benslimane
University of Avignon | UAPV · Laboratoire d'Informatique d'Avignon

PhD

About

241
Publications
45,372
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,904
Citations
Introduction
Security and Privacy in Computer Networks: Design and modeling of Communication Protocols. I am interested in BlockChain, IoT, Autonomous cars and drones and 5G.
Additional affiliations
September 2001 - present
University of Avignon
Position
  • Professor
Description
  • Security (DoS, jamming, PKI and Clustering), Communication Protocols, Graphs and Distributed Algorithms, Ad hoc Networks, Sensor Networks, Vehicular Networks, Internet of Things, Smart City protocols design.
September 2001 - present
University of Avignon
Position
  • Professor
Description
  • Networks, Multimedia, QoS, Communication Protocols, Wireless and Mobile Networks, Programming
September 1994 - August 2001
University of Technology of Belfort-Montbéliard
Position
  • Professor (Associate)
Description
  • Computing Networks and Multimedia
Education
September 1999 - December 2000
Cergy-Pontoise University
Field of study
  • Communication Protocols: Contribution à la Conception des Systèmes Multimédia pour les Réseaux Hétérogènes
September 1989 - July 1993
University of Franche-Comté
Field of study
  • Communication Protocols and Distributed Algorithms: Contribution à la validation des protocoles : réduction de l'espace d'états et décidabilité du caractère borné
September 1987 - July 1988
University of Franche-Comté
Field of study
  • Distributed Algorithms and Systems

Publications

Publications (241)
Article
Unmanned Aerial Vehicles (UAVs) have attracted extensive attention from both industry and academia owing to their high mobility, line-of-sight (LoS) characteristics of air-toground (A2G) channels, and low cost. However, the broadcast nature of wireless transmission and the LoS characteristics of A2G channels are vulnerable to eavesdropping attack,...
Article
Group communications play a crucial role in enhancing the quality of service (QoS) of Internet of Things (IoT) networks, enabling efficient information dissemination while minimizing resource utilization. However, ensuring information security and privacy in IoT group communications necessitates the implementation of an efficient and lightweight ke...
Article
The Internet of Drones (IoD) manages and coordinates communications between drones in Internet of Things (IoT) applications. Ensuring security and privacy in unmanned aerial vehicles (UAVs) networks, i.e., drones, is essential to protect data from cyber attacks. In this context, providing authentication is a major challenge due to the fact that dro...
Article
The Industrial Internet of Things (IIoT) network is composed of devices that contain sensitive data, which makes them vulnerable to various security threats. Digital Certificates can be used to reinforce the security of the IIoT network, however, their management remains a major issue. Hence, in this paper, we rely on trust management to deal with...
Article
Full-text available
In this work, we consider Reconfigurable Intelligent Meta-surfaces (RIMs) to provide effective beam steering functionality, while enhancing the coverage of the fifth generation (5G) users in a urban city mobility context. In particular, we enable communications in the millimeter wave (mmWave) frequencies, that can occur simultaneously with other 5G...
Preprint
To prevent implicit privacy disclosure in sharing gradients among data owners (DOs) under federated learning (FL), differential privacy (DP) and its variants have become a common practice to offer formal privacy guarantees with low overheads. However, individual DOs generally tend to inject larger DP noises for stronger privacy provisions (which en...
Article
Full-text available
Mission-criticalal Internet of Things (IoT)-based networks are increasingly employed in daily and industrial infrastructures. The resilience of such networks is crucial. Given IoT networks’ constantly changing nature, it is necessary to provide dependability and sustainability. A robust network monitoring can reinforce reliability, such that the mo...
Article
The proliferation of unmanned aerial vehicles (UAVs) opens up new opportunities for on-demand service provision anywhere and anytime, but also exposes UAVs to a variety of cyber threats. Low/medium interaction honeypots offer a promising lightweight defense for actively protecting mobile Internet of things, particularly UAV networks. While previous...
Article
Full-text available
Social features are affecting different application areas, from traditional online social networks to economical networks, as well as the study of epidemical behaviors of pandemics and diseases. From the information point of view, also the Internet paradigm has been revised according to social behaviors of nodes, showing intrinsic properties that h...
Article
The high mobility of vehicles in vehicular networks presents difficulties in timely and low-delay content delivery. Edge caching is a promising approach for overcoming these challenges. By properly caching data, we aim to improve service performance and reduce the load on the backhaul network. We propose two unique methods for caching data in the I...
Preprint
Full-text available
The proliferation of unmanned aerial vehicles (UAVs) opens up new opportunities for on-demand service provisioning anywhere and anytime, but also exposes UAVs to a variety of cyber threats. Low/medium interaction honeypots offer a promising lightweight defense for actively protecting mobile Internet of things, particularly UAV networks. While previ...
Preprint
Full-text available
p>This paper proposes an optimal and feasible incentive mechanism to promote collaborative defense for UAVs by sharing their captured threat data in local honeypots.</p
Preprint
The proliferation of unmanned aerial vehicles (UAVs) opens up new opportunities for on-demand service provisioning anywhere and anytime, but it also exposes UAVs to various cyber threats. Low/medium-interaction honeypot is regarded as a promising lightweight defense to actively protect mobile Internet of things, especially UAV networks. Existing wo...
Article
Adaptive multielement antennas can be leveraged to improve the reliability of wireless systems deployed in cluttered, depolarizing environments, such as those expected for Internet of Things (IoT) applications. While the performance improvement provided by such antennas has been well studied for individual links, multiple-hop networks have received...
Preprint
Full-text available
Proof of work (PoW), as the representative consensus protocol for blockchain, consumes enormous amounts of computation and energy to determine bookkeeping rights among miners but does not achieve any practical purposes. To address the drawback of PoW, we propose a novel energy-recycling consensus mechanism named platform-free proof of federated lea...
Article
Full-text available
Recently, the boosting growth of computation-heavy applications raises great challenges for the Fifth Generation (5G) and future wireless networks. As responding, the hybrid edge and cloud computing (ECC) system has been expected as a promising solution to handle the increasing computational applications with low-latency and on-demand services of c...
Article
The incorporation of advanced networking technologies makes modern systems vulnerable to cyber-attacks that can result in a number of harmful outcomes. Due to the increase of security incidents and massive activities on networks, existing works have mainly focused on designing Intrusion Detection Systems (IDSs) based on traditional machine learni...
Preprint
Virtual network embedding is one of the key problems of network virtualization. Since virtual network mapping is an NP-hard problem, a lot of research has focused on the evolutionary algorithm's masterpiece genetic algorithm. However, the parameter setting in the traditional method is too dependent on experience, and its low flexibility makes it un...
Preprint
Virtual network embedding (VNE) algorithm is always the key problem in network virtualization (NV) technology. At present, the research in this field still has the following problems. The traditional way to solve VNE problem is to use heuristic algorithm. However, this method relies on manual embedding rules, which does not accord with the actual s...
Article
Full-text available
The coordinated development of big data, Internet of Things, cloud computing and other technologies has led to an exponential growth in Internet business. However, the traditional Internet architecture gradually shows a rigid phenomenon due to the binding of the network structure and the hardware. In a high-traffic environment, it has been insuffic...
Article
Full-text available
This work is fulfilled in the context of the optimized monitoring of Internet of Things (IoT) networks. IoT networks are faulty; Things are resource-constrained in terms of energy and computational capabilities; they are also connected via lossy links. For IoT systems performing a critical mission, it is crucial to ensure connectivity, availability...
Article
To address the limited driving range of electric vehicles (EVs) and promote EVs penetration, vehicular energy networks (VENs) have emerged and opened possibility to charge EVs in motion via dynamic wireless power transfer (DWPT) technology. However, security and efficiency concerns arise due to the untrusted oper- ating environment and EVs selfish...
Article
Full-text available
The Internet of Things (IoT) has received a lot of attention worldwide in terms of security and private grants. Due to the increase of massive data transmission, many challenges arise in IoT applications including the database of critical infrastructure which has become vulnerable to a lot of legitimate and malicious activities in centralized as we...
Article
As the number of end users served by wireless networks continues to grow, modern wireless communication systems have put forward higher requirements for the diversity of wireless network forms. The unmanned aerial vehicle (UAV) wireless network communication system will occupy an important position in the future wireless communication system. With...
Conference Paper
Full-text available
Abstract—Vehicular ad hoc Networks have emerged as a viable alternative for enabling user applications on moving vehicles. However, maintaining acceptable levels of Quality of Service and message latency still remains a challenging task. Several solutions have been proposed for improving performance of these networks. Clustering has been considered...
Preprint
Full-text available
Recently, the boosting growth of computation-heavy applications raises great challenges for the Fifth Generation (5G) and future wireless networks. As responding, the hybrid edge and cloud computing (ECC) system has been expected as a promising solution to handle the increasing computational applications with low-latency and on-demand services of c...
Article
In recent years, many scholars have used data mining algorithms to discover the laws related to the prevention of occupational injuries in the construction industry. Using accident injury records to model occupational risk is a promising direction (for example, predict injury risk from accident frequency and severity). However, the records of speci...
Article
The publish/subscribe system over the vehicular networks enables the contents providers to obtain more profits from a flexible notification system. The publish/subscriber system is with an asynchronous communication protocol, which is suitable for the vehicles in a delay-tolerant network. However, as the trend of vehicles is moving towards autonomo...
Chapter
The Wireless Sensor Network (WSN) is hugely taking a big interest in worldwide in terms of security and private grants. Despite the increase of massive data transmission, a lot of challenges discovered in this technology, the data, and the critical information become vulnerable to a lot of malicious behaviors. In this paper, we proposed a new schem...
Article
The papers in this special section focus on heterogeneous communication networks. These networks, consisting of terrestrial mobile networks, satellite networks, IoT, WiFi, and etc., is a promising technique to meet the challenges in future mobile communications. Heterogeneous network resources are expected to cooperate with each other to support mo...
Article
Unmanned aerial vehicles (UAVs) combined with artificial intelligence (AI) have opened a revolutionized way for mobile crowdsensing (MCS). Conventional AI models, built on aggregation of UAVs’ sensing data (typically contain private and sensitive user information), may arise severe privacy and data misuse concerns. Federated learning, as a promisin...
Article
WiFi Fingerprint-based positioning technology emerges as a potential application to offer fundamental location information for indoor mobile users. However, the crowd traffic evaluation based on RSS fingerprints is vulnerable to the malicious check-in attacks. Attackers who are not at the target POI submit the self-modification RSS fingerprints. In...
Chapter
Many modern infrastructures incorporate a number of sensors and actuators interconnected via wireless links using Wireless Sensor Network (WSN) and Internet of Things (IoT) technology. With a number of mission-critical infrastructures embracing these technologies, the security of such infrastructures assumes paramount importance. A motivated malici...
Article
Healthcare applications are distinguished by being critical and time sensitive. Multiple healthcare applications have been implemented through Internet of Things (IoT) technology due to its capability of improving the quality and efficiency of treatments and accordingly improving the health of the patients. This paper contributes to the domain by p...
Article
Full-text available
Automobile manufacturers around the world are increasingly deploying Industrial Internet of Things (IIoT) devices in their factories to accompany the Industrial Revolution 4.0. Security and privacy are the main limitations to the integration of Internet of Things (IoT) into industrial processes. Therefore, it is necessary to protect industrial data...
Article
At present, there are many problems in the research of virtual network embedding (VNE) algorithm. Many researches adopt the heuristic algorithm and need to specify the embedding rules manually. The result is easy to fall into the local optimal solution, which is not in line with the actual situation. Besides, there are many security problems in the...
Article
The usage of Cognitive Radio Networks (CRNs) to establish Internet of Things (IoT) smart Networks is an effective and economical solution to the IoT spectrum scarcity problem. CRNs is merged with the IoT technology to be named Cognitive Radio Internet of Things (CRIoT). Spectrum sharing/scheduling in CRIoT has not attracted a lot of attention as it...
Article
The autonomous driving era is coming with tremendous potential to revolutionize transportation systems with improved safety, comfort, and intelligence on the road. Integrating connected autonomous vehicles (CAVs) and rising social networking, autonomous vehicular social networks (AVSNs) can facilitate the data dissemination in safety-critical and e...
Article
Full-text available
Many IoT applications have been developed recently, this leads to increasing the network load. To avoid the lack of spectrum, IoT can use cognitive radio network concept. This paper presents most of the researches addressing channel allocation and packets scheduling, when merging the cognitive radio networks with the IoT technology. Surveying the r...
Article
Full-text available
Unmanned aerial vehicles (UAVs) have been widely used to provide enhanced information coverage as well as relay services for ground Internet of Things (IoT) networks. Considering the substantially limited processing capability, IoT devices may not be able to tackle with heavy computing tasks. In this paper, a multi-UAV aided mobile edge computing (...
Article
Wireless sensor networks (WSNs) provide a significant contribution to the advancement of the Internet of Things (IoT) as it can transfer massive volume of data to the Internet with the help of low power and low-cost self-operating sensing devices. This paper deals with the congestion problem which is one of the critical issues in 6LoWPAN (IPV6 over...
Article
Full-text available
Resource allocation and spectrum management are two of the major challenges in the massive scale deployment of Machine-to-Machine (M2M) communication and Internet of Things (IoT) networks. Existence of large number of devices per unit area leads to the problem of congestion, network overload and deterioration of the Signal to Noise Ratio (SNR). The...
Preprint
Full-text available
Unmanned aerial vehicles (UAVs) have been widely used to provide enhanced information coverage as well as relay services for ground Internet of Things (IoT) networks. Considering the substantially limited processing capability, IoT devices may not be able to tackle with heavy computing tasks. In this paper, a multi-UAV aided mobile edge computing (...
Article
With the evolution of Internet of Vehicles (IoV), there has been an overwhelming increase in the number of connected vehicles in recent times. Due to this reason, massive amounts of data generated by connected vehicles makes traditional host centric approach inevitable in IoV ecosystem. Moreover, the existing TCP/IP-based congestion control mechani...
Article
Online social networks (OSNs) are comprised of people with social interactions and relationships, such as friendship and acquaintance. Social web communities (e.g., Facebook or Twitter), and content-sharing sites with social networking functionality (e.g., YouTube), have attracted millions of users, and OSNs are continuing to grow, with a giant num...
Article
Full-text available
With the rapid development in wireless technologies and the Internet, the Internet of Things (IoT) is envisioned to be an integral part of our daily lives. Localization-based services are among the most attractive applications related to the IoT. They are actually, thanks to the deployment of networks of sensors, able to collect and transmit data i...
Conference Paper
Full-text available
In this paper, we propose a distributed detection system for hierarchical information acquisition based on autonomous underwater vehicle (AUV) and underwater fixed sensor networks. Different from the previous information collection systems, where the AUV traverses each node to obtain information, we propose a layered network architecture in this wo...
Article
Full-text available
With the facilitation of the fifth generation (5G) New Radio (NR), Vehicle-to-Everything (V2X) applications have entered a brand new era to sustain the next generation driving use cases of advanced driving, vehicle platooning, extended sensors and remote driving. To deploy these driving use cases, the service requirements however include low latenc...
Conference Paper
In Internet of things (IoT) dedicated for healthcare, heterogeneous data can be gathered from different body sensors, environmental sensors and other data sources such as cameras, audio recorders, etc. The aggregation, synchronization, processing and fusion of these heterogeneous data are critical tasks to accurately provide real-time healthcare se...
Article
The Internet of Vehicles (IoVs) has emerged as a new spin-off research theme from traditional vehicular ad hoc networks (VANETs). It employs vehicular nodes connected to other smart objects equipped with a powerful multi-sensor platform, communication technologies, and IP-based connectivity to the Internet, thereby creating a possible social networ...