Chaker Abdelaziz Kerrache

Chaker Abdelaziz Kerrache
Université Amar Telidji Laghouat · Department of Mathematics and Computer Science

PhD (HDR)

About

84
Publications
14,054
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
864
Citations
Introduction
Chaker Abdelaziz Kerrache is an Associate Professor in the Department of Computer science at Amar Telidji University of Laghouat in Algeria. His research activity is related to Trust and Risk Management, Secure Multi-hop Communications, Vehicular Networks, Named Data Networking (NDN), and UAVs.
Additional affiliations
September 2018 - November 2020
Université de Ghardaia
Position
  • Professor (Associate)
September 2017 - September 2018
Université de Ghardaia
Position
  • Professor (Assistant)
March 2014 - June 2017
Université Amar Telidji Laghouat
Position
  • Part-time Teacher
Education
October 2015 - September 2016
Universitat Politècnica de València
Field of study
  • Computer Science
December 2012 - January 2017
Université Amar Telidji Laghouat
Field of study
  • Computer Science
September 2010 - July 2012
Université Amar Telidji Laghouat
Field of study
  • Computer Science

Publications

Publications (84)
Article
Trust establishment over vehicular networks can enhance the security against probable insider attackers. Regrettably, existing solutions assume that the attackers have always a dishonest behavior that remains stable over time. This assumption may be misleading, as the attacker can behave intelligently to avoid being detected. In this paper, we prop...
Article
In this paper we propose a novel trust establishment architecture fully compliant with the ETSI ITS standard which takes advantage of the periodically exchanged beacons (i.e CAM) and event triggered messages (i.e DENM). Our solution, called T-VNets, allows estimating the traffic density, the trust among entities, as well as the dishonest nodes dist...
Conference Paper
Cooperative intelligent transportation systems (C-ITS), mainly represented by Vehicular Ad Hoc Networks (VANETs), were developed to enhance safety on roads before being generalized to support other comfort and efficiency applications. Most VANET applications, including safety ones, are based on multi-hop communications. Hence, a certain trustworthi...
Conference Paper
Enhancing road safety is the main goal of Vehicular Adhoc Networks (VANETs). However, the assumption that all peers are honest and cooperative can lead to catastrophic situations. To deal with such misbehaving peers, trust establishment can be used to enhance the security without affecting network performance. In this paper, we propose an opportuni...
Conference Paper
Delivering data through the most reliable and trusted path is essential for any kind of network. Moreover, in highly mobile and dynamic networks such as VANETs, the problem is more complex since every node requires, at least, a previous knowledge about its own neighborhood to select the most adequate path. In addition, the open communication medium...
Article
Full-text available
Remotely monitoring people’s healthcare is still among the most important research topics for researchers from both industry and academia. In addition, with the Wireless Body Networks (WBANs) emergence, it becomes possible to supervise patients through an implanted set of body sensors that can communicate through wireless interfaces. These body sen...
Article
Full-text available
Unmanned aerial vehicles (UAVs) have gained increasing attention in boosting the perfor- mance of conventional networks due to their small size, high efficiency, low cost, and autonomously nature. The amalgamation of UAVs with both distributed/collaborative Deep Learning (DL) algorithms, such as Federated Learning (FL), and Blockchain technology ha...
Article
Full-text available
The deployment of a swarm of cooperative Unmanned Aerial Vehicles (UAVs) to pursue a mission is knowing an increasing success nowadays. This is mainly because deploying a group of cooperating UAVs instead of one single UAV offers numerous advantages, including the extension of the mission coverage, fault tolerance in case of losing a UAV during a m...
Article
Full-text available
Vehicular Social Networks (VSNs) is the bridge of social networks and Vehicular Ad-Hoc Networks (VANETs). VSNs are promising as they allow the exchange of various types of contents in large-scale through Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication protocols. Vehicular Named Data Networking (VNDN) is an auspicious comm...
Article
Industrial IoT has emerged as a new paradigm in the era of smart systems where interactions and transmission of messages among various entities in an industrial ecosystem are done autonomously. This includes manufacturing of products, shipment process, storage of records, and counting the data, to name a few. However, the involvement of multiple cy...
Preprint
Named Data Networking (NDN) is a prominent realization of the vision of Information-Centric Networking. The NDN architecture adopts name-based routing and location-independent data retrieval. Among other important features, NDN integrates security mechanisms and focuses on protecting the content rather than the communications channels. Along with a...
Article
Named Data Networking (NDN) is a prominent realization of the vision of Information-Centric Networking. The NDN architecture adopts name-based routing and location-independent data retrieval. Among other important features, NDN integrates security mechanisms and focuses on protecting the content rather than the communications channels. Along with a...
Article
Full-text available
Smart social systems are ones where a number of individuals share and interact with each other via various networking devices. There exist a number of benefits to including smart-based systems in networks such as religions, economy, medicine, and other networks. However, the involvement of several cyber threats leads to adverse effects on society i...
Article
Full-text available
Information-centric Networking (ICN) is a new networking paradigm that aims to solve the problem of the traditional TCP/IP-based Internet. Content-centric Networking (CCN) and Named Data Networking (NDN), both based on the Interest/Data communication paradigm, are two of the most well-known and specialized implementations of ICN. In contrast to typ...
Article
During the recent pandemic events and lockdown, most educational institutions have moved into online and distance learning. Certain institutions have been more ready than others to shift into full online learning and teaching mode. However, many technical and security challenges and issues related to the learning management system have been encount...
Article
Full-text available
Named data networking (NDN) is one of the emerging and promising paradigms of the future internet architecture. An essential feature in NDN is in-network caching, where the contents are decoupled from their physical locations to achieve an effective and consistent content distribution. However, caching capacity in NDN is relatively small and cannot...
Article
Full-text available
This paper addresses the fundamental problem of the trade-off between resource efficiency and user satisfaction in the limited environments of Named Data Networks (NDNs). The proposed strategy is named RADC (Resource Allocation based Data Classification), which aims at managing such trade-off by controlling the system’s fairness index. To this end,...
Article
Integrating unmanned aerial vehicles (UAV) into the cloud environment aims to put their onboard equipment and capabilities at the service of end users at an affordable cost. Coupling both technologies will help leveraging them as a strong and novel service provider. This integration incolves service infrastructures, services offer and request proto...
Conference Paper
In a jiffy after the outbreak of the 2019 novel coron-avirus, also called COVID-19 or SARS-CoV-2, the World Health Organization (WHO) considered it as a pandemic that threatens the demise of humanity. This quick decision was in conjunction with a real situation of biological inability to find a vaccine that can eliminate the virus or at least limit...
Article
The massive increase in population density in cities has led to several urban problems, such as an increment of air pollution, traffic congestion, and a faster spread of infectious diseases. With the rapid innovation in the intelligent sensors technology, and its integration into smart vehicles and Unmanned Aerial Vehicles (UAVs), a novel sensing p...
Conference Paper
Unmanned Aerial Vehicles (UAVs) cloud have attracted wide attentions from both industrial and academic communities as a new paradigm offering flexible services. This new concept utilizes the recent technologies of mobile cloud computing. The collaboration between these technologies represents a fantastic vision of the future, where everything is co...
Article
Full-text available
Healthcare professionals and scholars have emphasized the need for IoT-based remote health monitoring services to track the health of the elderly. Such systems produce a large amount of data, necessitating the security and privacy of that data. On the other hand, Software Defined Networking (SDN) integration could be seen as a good solution to guar...
Article
Technology advancements promote a redefinition of traditional instructional method-ologies, as well as the roles of teachers and learners towards an efficient e-learning ecosystem. To date, all existing solutions are combined with the conventional face-to-face learning process. However, the latter can be unexpectedly hindered in some emergency case...
Article
Most of Flying Adhoc Networks (FANETs) applications consume GPS based location information for their services, which are also shared in real-time with other UAVs, ground control stations and centralized service operators. GPS spoofing is among the most popular attacks in FANETs that lead the Global Navigation Satellite System (GNSS) receivers to ge...
Article
Internet of Vehicles (IoV) is an evolution of the Internet of Things (IoT) to improve the capabilities of vehicular ad-hoc networks (VANETs) in intelligence transport systems. The network topology in IoV paradigm is highly dynamic. Clustering is one of the promising solutions to maintain the route stability in the dynamic network. However, existing...
Conference Paper
With the emergence of connected and intelligent vehicles, various research projects aiming at reducing traffic accidents by detecting driver behavior have also emerged. These vehicles are generally equipped with cameras and sensors that can be used to detect driver's fatigue, drowsiness, and distraction using different technologies and a multitude...
Article
The healthcare industry deals with highly sensitive data which must be managed in a secure way. Electronic Health Records (EHRs) hold various kinds of personal and sensitive data which contain names, addresses, social security numbers, insurance numbers, and medical history. Such personal data is valuable to the patients, healthcare service provide...
Article
Workflows and workflow scheduling are increasingly used in many applications with many tasks and dependency constraints between these tasks. On the other hand, cloud computing offers huge opportunities to process large-scale workflows and data-intensive applications. The processing performance of a workflow is highly depending on how the different...
Article
Industrial Internet-of-Things (IIoT) refers to the next stage in the evolution of organizations where collecting, analyzing, recording the data and controlling the entire activities of the various entities is achieved with connected machines in real time with enhanced quality and minimum production cost. Although, various phenomenal schemes for cro...
Article
Full-text available
As a promising topic of research, Vehicular Cloud (VC) incorporates cloud computing and ad-hoc vehicular network (VANET). In VC, supplier vehicles provide their services to consumer vehicles in real-time. These services have a significant impact on the applications of internet access, storage and data. Due to the high-speed mobility of vehicles, us...
Article
Internet-of-Vehicles (IoV) is a novel technology to ensure safe and secure transportation by enabling smart vehicles to communicate and share sensitive information with each other. However, the realization of IoV in real-life depends on several factors, including the assurance of security from attackers and propagation of authentic, accurate and tr...
Conference Paper
The deployment of a swarm of cooperative UAVs applications for the execution of distributed tasks has increased attention from both academia and industry researchers. The use of a group of UAVs instead of one single UAV offers many advantages like extending the mission coverage, providing a reliable ad-hoc networks services, and enhancing the servi...
Article
The respiratory viral diseases, such as those caused by the family of coronaviruses, can be extremely contagious and spread through saliva droplets generated by coughing, sneezing, or breathing. In humans, the most common symptoms of the infection include fever and difficulty in breathing. In order to reduce the diffusion of the current “Coronaviru...
Article
Crowd management systems play a vital role in today's smart cities and rely on several Internet of Things (IoT) solutions to build prevention mechanisms for widespread viral diseases such as Coronavirus 2019 (COVID-19). In this article, we propose a framework to aid in preventing widespread viral diseases. The proposed framework consists of a physi...
Preprint
Journal publications written in English are a sina qua non condition for national and international recognition. Recent literature in applied linguistics and other fields has denounced the existence of some conventions and “rules” that govern a given research writing. That is, using a concise, clear and error-free language is demanded in order to i...
Preprint
Full-text available
The respiratory viral diseases, such as those caused by the family of coronaviruses, can be extremely contagious and spread through saliva droplets generated by coughing, sneezing or breathing. In humans, the most common symptoms of the infection include fever and difficulty in breathing. In order to reduce the diffusion of the current Coronavirus...
Article
Full-text available
Journal publications written in English are a sina qua non condition for national and international recognition. Recent literature in applied linguistics and other fields has denounced the existence of some conventions and “rules” that govern a given research writing. That is, using a concise, clear and error-free language is demanded in order to i...
Article
Full-text available
Vehicular sensor networks (VSN) provide a new paradigm for transportation technology and demonstrate massive potential to improve the transportation environment due to the unlimited power supply of the vehicles and resulting minimum energy constraints. This special issue is focused on the recent developments within the vehicular networks and vehicu...
Article
Named Data Networking (NDN) is a promising candidate for Future Internet Architecture (FIA), where the focus of communication is the content itself rather than the source of the requested content. NDN is one of the implementations of Information-Centric Networking (ICN). Among other salient features, NDN provides intrinsic security where security i...
Chapter
Internet of Vehicle (IoV) is a keystone in establishing smart cities IoT applications. In such highly connected network, embedded wireless communication technologies are used to facilitate the different Vehicule-to-X communications. To do so, mainly two technologies are used (i) short range communication such as DSRC (Dedicated Short Range Communic...
Article
Full-text available
Vehicular networks aim to support cooperative warning applications which involve dissemination of warning messages to reach vehicles in a target area. Due to the high mobility of vehicles, imperative technologies such as Software Defined Network (SDN) and Edge Computing (EC) have been proposed for next generation vehicular network. The SDN separate...
Conference Paper
Malware analysis relies on monitoring the behavior of a suspected application within a confined, controlled and secure environment. These environments are commonly referred to as "Sandboxes'' and are often virtualized replicas of a regular system. Hypervisor-based sandboxes were among the most commonly used techniques for malware analysis during th...
Article
Full-text available
With the rapid growth of Internet of Things (IoT) devices around the world, thousands of mobile users share many data with each other daily. IoT communication has been developed in the past few years to ensure direct connection among mobile users. However, wireless vulnerabilities exist that cause security concerns for IoT device-to-device (D2D) co...
Conference Paper
Electroencephalogram (EEG) has been recently applied in many research fields. However little research has been performed to explore how EEG can be used efficiently in information security and cryptography. This paper aims to highlight the required steps to follow to ensure a strong biometric crypto-key based on EEG signals. To this end, this work p...
Article
Full-text available
Cognitive radio is considered as a pioneering technique in the domain of wireless communication as it enables and permits the Cognitive Users (CU) to exploit the unused channels of the Primary Users (PU) for communication and networking. The CU nodes access the vacant bands/channels through the Cognitive Radio Network (CRN) cycle by executing its d...
Conference Paper
Vehicular Ad-hoc NETworks (VANET) have revolutionised the intelligent transportation systems. Indeed, they enable vehicles to communicate with each other and with the infrastructure, and they facilitate several vital applications in real-time. Several trust models have been proposed to ensure a secured VANET and the authenticity, integrity and reli...
Article
Routing in cooperative UAVs networks is a challenging task due to mobility of nodes, dynamically changing topology and three-dimensional (3D) movement. In this work, we study the fleet routing problem in FANET, which aims at delivering data to a specific group of mobile drones identified by their geographical location. Although many fleet routing p...
Conference Paper
As part of smart cities, Internet of Vehicle (IoV) is an application of IoT. In such network, the wireless communication technologies to facilitate the vehicles communication with each other and with the other public networks include two main classes of communication standards are used: (i) short range communication such as DSRC (Dedicated Short Ra...
Conference Paper
Named Data Networking (NDN) is a promising candidate for future internet architecture. It is one of the implementations of the Information-Centric Networking (ICN) architectures where the focus is on the data rather than the owner of the data. While the data security is assured by definition, these networks are susceptible of various Denial of Serv...
Article
With the exponential growth in the number of vital infrastructures such as nuclear plants and transport and distribution networks, these systems have become more susceptible to coordinated cyberattacks. One of the effective approaches used to strengthen the security of these infrastructures is the use of unmanned aerial vehicles (UAVs) for surveill...
Chapter
Vehicular ad-hoc network (VANET) and internet-of-vehicles (IoV) are complex networks which provide a unique platform for vehicles to communicate and exchange critical information (such as collision avoidance warnings) with each other in an intelligent manner. Thus, the information disseminated in the network should be authentic and originated from...
Article
The revolution of Internet-of-vehicles (IoV) has stimulated a substantial response from academia, research, and industry due to its massive potential to improve overall transportation. Current IoV faces huge challenges due to its reliance on IP-based network architecture. Therefore, named data networking (NDN) is proposed as a promising architectur...
Chapter
Vehicular ad hoc 1 networks (VANETs) have emerged as a new breed of Self-Organized Networks (SONs). In addition to the Vehicle-to-Vehicle and Vehicle to-RoadSide Units, it assumes that vehicular nodes are connected to other smart objects equipped with a powerful multi-sensor platform, communication technologies, computation units, and IP-based conn...
Conference Paper
The emergence of Internet-of-Things (IoT) has attracted a massive response from different stakeholders including industry, academia and research community due to the wide range of applications it provides. IoT enables devices with storage, computation and communication capabilities to connect to the Internet, thus providing various applications suc...
Conference Paper
Vehicular Adhoc Networks (VANET) is the backbone technology behind Intelligent Transportation Systems (ITS) which offers a plethora of safety and comfort applications. With their powerful computation and storage capacities, vehicles themselves can play the role of services producers, thus, realizing the concept of Vehicular Clouds (VC) within the n...
Article
The Internet of Vehicles (IoVs) has emerged as a new spin-off research theme from traditional vehicular ad hoc networks (VANETs). It employs vehicular nodes connected to other smart objects equipped with a powerful multi-sensor platform, communication technologies, and IP-based connectivity to the Internet, thereby creating a possible social networ...
Article
Full-text available
Flying Ad hoc Network (FANET) is a new resource-constrained breed and instantiation of Mobile Ad hoc Network (MANET) employing Unmanned Aerial Vehicles (UAVs) as communicating nodes. These latter follow a predefined path called ’mission’ to provide a wide range of applications/services. Without loss of generality, the services and applications offe...
Article
This paper introduces the concept of a new service for social internet of vehicles (IoV)-based clouds called Incentives-based Vehicle Witnesses as a Service (IVWaaS), which employs vehicles moving on the road as the witnesses to designated events. Specifically, we focus on two key enablers, a new secure and privacy preserving service framework as w...
Article
This paper presents a fault-tolerant algorithm ensuring multiple resources sharing in Mobile Adhoc Networks (MANETs) that is able to handle the known k-mutual exclusion problem in such mobile environments. The proposed algorithm relies on a token-based strategy, and requires information about resources and their use to be carried in routing protoco...
Article
Efficient information dissemination is the pinnacle of Vehicular Ad-hoc Networks (VANETs). In case of delay-sensitive information such as safety-related messages, it is imperative to minimize the transmission delay and increase the message reliability in VANETs. In a previous work, we proposed a Time-Limited Reliable Broadcast Incremental Power (TR...
Conference Paper
Ensuring the required trustiness among communicating peers is an important task in Vehicular Adhoc Networks (VANETs), especially for safety-related applications where the margin of error is extremely undesired. Most the safety applications are a kind of decision aided system, and final decision is always taken by humans. Thus, in addition to securi...