
Bouziane Brik- PhD
- Professor (Associate) at University Bourgogne Franche-Comté
Bouziane Brik
- PhD
- Professor (Associate) at University Bourgogne Franche-Comté
Associate professor at Bourgogne university (France)
About
129
Publications
13,722
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,146
Citations
Introduction
Hi, I am Bouziane BRIK, a doctor in computer science. During my R&D experience, I mainly worked on wireless networks such as vehicular networks, Internet of Things (IoT), industrial IoT, 5G, Network slicing, etc. I addressed many issues of such wireless networks using different analytical frameworks including Game theory, Fuzzy logic, Multi-objective optimization, and Machine learning. Currently, I am working as associate professor at Burgundy (Bourgogne) university in France.
Current institution
Additional affiliations
September 2013 - September 2017
Publications
Publications (129)
In recent years, the concept of the metaverse has gained considerable momentum as virtual environments become more immersive and sophisticated. As this technology advances, it can potentially affect various aspects of our lives, including how we produce, consume, and trade energy. Peer-to-peer (P2P) energy trading, facilitated by digital twins (DTs...
Intelligent Transportation Systems (ITS) generate massive amounts of Big Data through both sensory and non-sensory platforms. The data support batch processing as well as stream processing, which are essential for reliable operations on the roads and connected vehicles in ITS. Despite the immense potential of Big Data intelligence in ITS, autonomou...
In today’s rapidly evolving cyber landscape, the growing sophistication of attacks, including the rise of zero-day exploits, poses critical challenges for network intrusion detection. Traditional Intrusion Detection Systems (IDSs) often struggle with the complexity and high dimensionality of modern cyber threats. Quantum Machine Learning (QML) seam...
The increasing complexity of consumer networks, characterized by the rapid adoption of Internet of Things (IoT) devices and smart home technologies, exposes significant limitations in traditional security mechanisms. These challenges drive a growing interest in innovative solutions, such as generative artificial intelligence, including large langua...
Flying Ad-Hoc Networks (FANETs), commonly referred to as drones or Unmanned Aerial Vehicles (UAVs), are increasingly transforming various industries by supporting numerous applications. In this context, a UAV can function as a cloud service provider, offering services such as memory, computing, and network connectivity to consumer UAVs. This work i...
The rapid development of Autonomous Vehicle Systems (AVS) is transforming transportation, enabling safer, more efficient mobility. However, ensuring the security and privacy of sensitive data generated by AVS remains a major challenge. Federated Learning (FL) has emerged as a promising solution for AVS by enabling distributed machine learning acros...
Consumer networks face several security challenges due to the distributed nature of edge devices and the sensitive data they handle. Federated Learning (FL) presents a promising paradigm for collaborative model training in distributed environments. However, its implementation in edge consumer networks raises concerns about model heterogeneity, comm...
Distributed Denial of Service (DDoS) attacks pose significant threats to the availability and security of consumer networks and Internet service providers (ISPs). This is a significant concern due to the potential vulnerabilities and security risks associated with the rapid increase in the number of insecure Internet of Things (IoT) devices. Adopti...
Deep Reinforcement Learning (DRL) has become a fundamental element in advancing Autonomous Systems, significantly transforming fields like autonomous vehicles, robotics, and drones. This survey paper provides a comprehensive overview of the role of DRL in autonomous systems, focusing on recent advancements, applications, and challenges. Through a s...
Underwater Wireless Sensor Networks (UWSNs) play a critical role in collecting data for variousmarine applications, but their deployment and maintenance in harsh underwater environmentspose significant challenges. Building upon our prior conceptual work, this paper presents a prac‐tical implementation of an AI‐driven fault detection system for UWSN...
The recent o-ran specifications promote the evolution of ranran architecture by function disaggregation, adoption of open interfaces, and instantiation of a hierarchical closed-loop control architecture managed by ric entities. This paves the road to novel data-driven network management approaches based on programmable logic. Aided by ai and ml, no...
The evolution of Open Radio Access Networks (ORAN) is crucial for the deployment and operation of 6G networks, providing flexibility and interoperability through its disaggregated and open architecture. However, this openness introduces new security issues. To address these challenges, we propose a novel Zero-Trust architecture tailored for ORAN (Z...
Wireless Sensor Networks (WSNs) show significant potential through their ability to collect and analyze real-time data, notably enhancing various sectors. The new emerging security threats present a severe risk to the security and reliability of WSNs. Data-driven Artificial Intelligence (AI) leverages WSNs data to deal with new emerging threats lik...
Artificial intelligence (AI) continues to be transformative across various domains, integrating learning paradigms like machine learning, modular learning, and federated learning. In conjunction with emerging technologies such as the Internet of Things, Industry 4.0, blockchain-enabled Web 3.0, and 5G, AI has fueled numerous real-world applications...
The proliferation of consumer networks has increased vulnerabilities to network intrusions, emphasizing the critical need for robust intrusion detection systems (IDS). The data-driven Artificial Intelligence (AI) approach has gained attention for enhancing IDS capabilities to deal with emerging security threats. However, these AI-based IDS face cha...
Deploying Connected and Automated Vehicles (CAVs) on top of 5G and Beyond networks (5GB) makes them vulnerable to increasing vectors of security and privacy attacks. In this context, a wide range of advanced machine/deep learning based solutions have been designed to accurately detect security attacks. Specifically, supervised learning techniques h...
Intelligent Transportation Systems (ITSs) are transforming the global monitoring of road safety. These systems, including vehicular networks and transportation infrastructure, are vulnerable to several security issues, which could disrupt services and potentially cause harm to the users. It is crucial to establish robust security measures to protec...
Open RAN (ORAN or O-RAN) revolutionizes Radio Access Networks (RAN) by offering flexibility and cost-efficiency through inter-vendor equipment interoperability. More importantly, it addresses emerging security threats, such as jamming attacks, by incorporating network softwarization and leveraging Artificial Intelligence (AI) techniques. However, A...
In recent times, we have witnessed the rapid and remarkable evolution of communication technologies, particularly in the domain of Flying Ad Hoc Networks (FANETs). This evolution has necessitated a thorough evaluation and significant enhancement of routing protocols to improve the overall performance of the system. To address the challenge of effic...
Sixth-generation (6G) networks anticipate intelligently supporting a wide range of smart services and innovative applications. Such a context urges a heavy usage of Machine Learning (ML) techniques, particularly Deep Learning (DL), to foster innovation and ease the deployment of intelligent network functions/operations, which are able to fulfill th...
Collaborative machine learning is considered as the bedrock of the intelligent B5G networks, where distributed agents collaborate with each other to train learning models in a distributed fashion, without sharing data at a central entity. Despite its broad applicability, the main issue of collaborative learning is the need of local computing to bui...
The rapid progression of Cloud Computing (CC) technology has ushered in innovative ecosystem concepts such as Mobile Cloud Computing (MCC). In this context, the incorporation of Unmanned Aerial Vehicles (UAVs) into these cloud ecosystems has unlocked new avenues for use cases such as delivery services, disaster response, and surveillance. However,...
Current flow-based Network Intrusion Detection Systems (NIDSs) have the drawback of detecting attacks only once the flow has ended, resulting in potential delays in attack detection and increasing the risk of damage due to the infiltration of a greater number of malicious packets. Moreover, the delay provides attackers with an extended period of pr...
Zero-touch network and service management (ZSM) is a key pillar of 6G networks. It allows the 6G management and orchestration framework to operate the networks without external (e.g., human) intervention. To effectively achieve ZSM, advanced network management procedures are required to detect and resolve anomalies within the 6G network autonomousl...
Finding parking spots in urban areas poses significant challenges due to the ever increasing complexities of the transportation endeavor, resulting in issues like traffic jams, higher fuel consumption, and environmental pollution. In this regard, this paper introduces an innovative Cooperative parking search strategy that relies on agent decision-m...
Sixth-generation (6G) networks anticipate intelligently supporting a wide range of smart services and innovative applications. Such a context urges a heavy usage of Machine Learning (ML) techniques, particularly Deep Learning (DL), to foster innovation and ease the deployment of intelligent network functions/operations, which are able to fulfill th...
p>World applications could be optimized using AI approaches. However, due to the ever-increasing complexity of operations and services, it is challenging to address today's industrial systems' heterogeneous requirements for high reliability, ultra-low latency, high data rates, and limited resources through conventional neural networks. In this stud...
p>World applications could be optimized using AI approaches. However, due to the ever-increasing complexity of operations and services, it is challenging to address today's industrial systems' heterogeneous requirements for high reliability, ultra-low latency, high data rates, and limited resources through conventional neural networks. In this stud...
The Internet of Things (IoT) is revolutionising our everyday life by connecting a massive number of smart objects. IoT is considered a key enabler of multiple emerging applications in several areas such as manufacturing, agriculture, healthcare, automotive, smart city, etc. However, as it becomes increasingly prevalent in our life, IoT brings a num...
The recent O-RAN specifications promote the evolution of RAN architecture by function disaggregation, adoption of open interfaces, and instantiation of a hierarchical closed-loop control architecture managed by RAN Intelligent Controllers (RICs) entities. This paves the road to novel data-driven network management approaches based on programmable l...
The zero Touch Management (ZSM) concept in 5G and Beyond networks (B5G) aims to automate the management and orchestration of running network slices. This requires heavy usage of advanced deep learning techniques in a closed-loop way to auto-build the suitable decisions, enabling to meet network slices’ requirements. In this context, Federated Learn...
Building accurate Machine Learning (ML) attack detection models for 5G and Beyond (5GB) vehicular networks requires collaboration between Vehicle-to-Everything (V2X) nodes. However, while operating collaboratively, ensuring the ML model's security and data privacy is challenging. To this end, this article proposes a secure and privacy-preservation...
In vehicle-to-everything (V2X) networks, security and safety are inherently difficult tasks due to the distinct characteristics of such networks, such as their highly dynamic topology and frequent connectivity disruptions. Jellyfish attacks are a sort of denial of service attack that are challenging to deal with, since they conform to protocol norm...
5G Vehicle-to-Everything (5G-V2X) communications will play a vital role in the development of the automotive industry. Indeed and thanks to the Network Slicing (NS) concept of 5G and beyond networks (B5G), unprecedented new vehicular use-cases can be supported on top of the same physical network. NS promises to enable the sharing of common network...
Internet of Things (IoT) is a promising paradigm that is considered as major enabler of smart cities. However, with the emergence of IoT botnets, the number of unsecured IoT devices is increasing rapidly. This can give attackers more advanced tools to carry out large scale damaging IoT attacks. Advanced Machine Learning (ML) techniques can help enh...
With the advent of multimedia content, sensing, imaging technologies, compute capabilities, and networking and Cloud solutions, the XReality (XR) technologies and solutions are continuously evolving. XR is used as an umbrella term to describe Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR). Recent advances in XR and immersive t...
In the last decade, with the arrival of the 5G communication technology and the increasing numbers of vehicles being connected to the internet, conventional vehicle ad-hoc networks (VANETs) are evolving towards the internet of vehicles (IoV), which makes the co-existence of IEEE 802.11p and 5G-based technologies very important for the design of a h...
In this work, adjustment of nodes’ sending rate in IPv6 over Low-power Wireless Personal Area Networks (6LoWPAN) is investigated. 6LoWPAN enables low-power equipment connecting to the Internet via Internet of Things (IoT) network. In such network, nodes are competing to share the bandwidth, in order to deliver their sensed data as fast as possible,...
Internet of vehicles (IoV) is rapidly growing as key enablers of new applications related to Intelligent Transportation System (ITS), including: autonomous driving, teleoperation, cooperative manoeuvre and perception, etc. The design of such new applications relies mainly on the performance of data dissemination techniques, which enable vehicles to...
Data-driven Machine and Deep Learning (ML/DL)
is an emerging approach that uses medical data to build robust
and accurate ML/DL models that can improve clinical decisions
in some critical tasks (e.g., cancer diagnosis). However, ML/DLbased healthcare models still suffer from poor adoption due
to the lack of realistic and recent medical data. The pr...
The papers in this special section focus on artificial intelligence (AI)-powered Internet of Everything services in next generation wireless networks. These networks are undergoing a major revolution, connecting billions of machines and millions of people. These networks are marketed as the key enabler of an unprecedented Internet of Everything (Io...
Unmanned aerial vehicles (UAVs) have gained increasing attention in boosting the performance of conventional networks due to their small size, high efficiency, low cost, and autonomously nature. The amalgamation of UAVs with both distributed/collaborative Deep Learning (DL) algorithms, such as Federated Learning (FL), and Blockchain technology have...
Data centers are becoming an important asset in today’s connected and intelligent world. Indeed, with the emergence of
$5G$
networks, the growth of Internet of Things (IoT) and cloud computing, the data centers are increasingly becoming an essential component in delivering our daily services. On the other hand, cloud data centers, are outfitted w...
The growth of the Internet of Things (IoT) is accompanied by serious cybersecurity risks, especially with the emergence of IoT botnets. In this context, intrusion detection systems (IDSs) proved their efficiency in detecting various attacks that may target IoT networks, especially when leveraging machine/deep learning (ML/DL) techniques. In fact, M...
Industry 5.0 is rapidly growing as the next industrial evolution, aiming to improve production efficiency in the 21 century. This evolution relies mainly on advanced digital technologies, including Industrial Internet of Things (IIoT), by deploying multiple IIoT devices within industrial systems. Such a setup increases the possibility of threats, e...
Vehicular Fog Computing exploits the computing , caching and communication resources at vehicles to facilitate different location-based applications in a smart urban environment. Today, consumer vehicles can discover and consume available services from nearby vehicles, acting as provider vehicles in a fog network. However, it is challenging for the...
Cooperative collision avoidance between inland waterway ships is among the envisioned services on the Internet of Ships. Such a service aims to support safe navigation while optimizing ships' trajectories. However, to deploy it, timely and accurate prediction of ships' positioning with real-time reactions is needed to anticipate collisions. In such...
Industry 4.0 is based on machine learning and advanced digital technologies, such as Industrial-Internet-of-Things and Cyber-Physical-Production-Systems, to collect and process data coming from manufacturing systems. Thus, several industrial issues may be further investigated including, flows disruptions, machines’ breakdowns, quality crisis, and s...
Monitoring the thermal comfort of building occupants is crucial for ensuring sustainable and efficient energy consumption in residential buildings. It enables not only remote real-time detection of situations, but also a timely reaction to reduce the damage made by harmful situations in targeted buildings. In this paper, we first design a new Inter...
Open Radio Access Network (O-RAN) alliance was recently launched to devise a new RAN architecture featuring open, software-driven, virtual, and intelligent radio access architecture. O-RAN architecture is based on (1) disaggregated RAN functions that run as Virtual Network Function (VNF) and Physical Network Function (PNF); (2) the notion of RAN co...
Internet of Things (IoT) is an emerging paradigm that is turning and revolutionizing worldwide cities into smart cities. However, this emergence is accompanied with several cybersecurity concerns due mainly to the data sharing and constant connectivity of IoT networks. To address this problem, multiple Intrusion Detection Systems (IDSs) have been d...
Integrating unmanned aerial vehicles (UAV) into the cloud environment aims to put their onboard equipment and capabilities at the service of end users at an affordable cost. Coupling both technologies will help leveraging them as a strong and novel service provider. This integration incolves service infrastructures, services offer and request proto...
With the rapid emerging of Internet of Things (IoT) devices and the proliferation of cloud-based applications, the cloud computing industry is becoming a vital element for ensuring our daily services. However, cloud computing uses large scale data centers equipped with energy-hungry servers and huge power facilities that massively consume power. Th...
The emerging 5G networks promise to support novel network services with different requirements in terms of Quality of Service (QoS), such as low-latency and high bandwidth. Thanks to the network slicing concept, 5G is able to fulfill these different requirements while sharing the same physical infrastructure. Although network slicing is gaining mat...
5G opens the door not only for new network services but also for a new business model involving new business actors. Particularly, the introduction of Network Slicing encourages the appearance of new stakeholders, namely Verticals or network slice tenants, Network Slice Providers, and Resource Providers. The Network Slice Provider sells end-to-end...
Recently, internet of vehicles has become an active field for researchers because it allows efficient and reliable wireless communication between vehicles to everything, which has motivated many researchers to develop communication paradigms that meet emerging vehicle requirements in smart cities. Dedicated Short Range Communication-based approache...
Monitoring the thermal comfort of building occupants is crucial for ensuring sustainable and efficient energy consumption in residential buildings. Existing studies have addressed the monitoring of thermal comfort through questionnaires and activities involving occupants. However, few studies have considered disabled people in the monitoring of the...
Collision detection and avoidance between vehicles is one of the key services envisioned in the Internet of Vehicles. Such services are usually deployed at the multi-access edge computing (MEC) to ensure low-latency communication and thus guarantee real-time reactions to avoid collisions between vehicles. In order to maximize the coverage of the ro...
The major role played by cloud data centers in the storage, computing and management of data generated by the Internet of Things will exponentially grow over time. This chapter is a closer examination of the energy efficiency of information and communication infrastructures in a smart grid‐cloud. It deals in particular with communication networks a...
In this paper, we target dissemination issues of emergency messages in a highly dynamic Internet of Vehicles (IoV) network. IoV is emerging as a new class of vehicular networks to optimize road safety as well as users’ comfort. In such a context, forwarding emergency messages through vehicle-to-vehicle communications (V2V) plays a vital role in ena...
Achieving a fair usage of network resources is of vital importance in Slice-ready 5G network. The dilemma of which network slice to accept or to reject is very challenging for the Infrastructure Provider (InfProv). On one hand, InfProv aims to maximize the network resources usage by accepting as many network slices as possible; on the other hand, t...
The use of Unmanned Aerial Vehicles (UAVs) for wireless networks is rapidly growing as key enablers of new applications, including: surveillance and monitoring, military, delivery of medical supplies, telecommunications, etc. In particular, due to their unique proprieties such as flexibility, mobility, and adaptive altitude, UAVs can act as mobile...
The 5th generation of the cellular mobile communication system (5G) is in the meantime stepwise being deployed in mobile carriers' infrastructure. Various standardization tracks as well as research activity are investigating the exploitation of the very flexible 5G system architecture for customized deployments, meeting requirements of the vertical...