Habib Youssef

Habib Youssef
University of Sousse | ISTLS · Institute of Computer Sciences and Communication Techniques (ISITCom)

PhD

About

236
Publications
27,588
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,883
Citations
Citations since 2017
34 Research Items
1540 Citations
2017201820192020202120222023050100150200250
2017201820192020202120222023050100150200250
2017201820192020202120222023050100150200250
2017201820192020202120222023050100150200250
Additional affiliations
January 2001 - December 2005
University of Monastir
Position
  • Professor (Associate)

Publications

Publications (236)
Article
The collaboration between ground and flying robots can take advantage of the capabilities of each system to enhance the performance of robotic applications, including military, healthcare, disaster management, etc. Unfortunately, this cooperation is restricted by the physical constraint that all computation should be performed on robots. The concep...
Chapter
In a distributed mobile Software Defined Mobile Network (SDMN), a device is in a continuous movement from one domain to another. Since a different controller is responsible for each domain, the devices’ authentication information needs to be communicated between the SDN controllers (this type of communication is called East-West communication) to e...
Article
Software Defined Networking (SDN) has emerged as a promising paradigm offering an unprecedented programmability, scalability and fine-grained control over forwarding elements (FE). Mainly, SDN decouples the forwarding plane from the control plane which is moved to a central controller that is in charge of taking routing decisions in the network. Ho...
Article
The Internet of Things (IoT) is a network that encompasses every physical object being connected to the Internet. The IoT objects face several issues and challenges due to the large number and the heterogeneity of the interconnected devices. Many researchers have shown that security is among the most important challenges that the IoT faces. Securit...
Chapter
SDN (Software Defined Networking) is a new network paradigm that facilitates network management by separating network control logic from switches and routers. Obviously, the separation of the network policy and the hardware implementation help improve quality of service (QoS) provided by the network. Therefore, SDN is able to provide flexible QoS c...
Article
Full-text available
Software Defined Networking (SDN) is a promising paradigm in the field of network technology. This paradigm suggests the separation between the control plane and the data plane which brings flexibility, efficiency and programmability to network resources. SDN deployment in large scale networks raises many issues which can be overcame using a collab...
Article
Full-text available
The Internet of Things (IoT) connects huge number of devices using the internet to collect data. The IoT has a variety of application domains, including health care. In this scenario, the patients can use wearable or implanted medical sensors for measuring medical parameters anywhere and anytime. The medical sensors are typically equipped with batt...
Article
Full-text available
Software defined networking (SDN) gains a lot of interest from network operators due to its ability to offer flexibility, efficiency and fine-grained control over forwarding elements (FE) by decoupling control and data planes. In the control plane, a centralized node, denoted controller, receives requests from ingress switches and makes decisions o...
Chapter
The major concerns of cloud providers is resource management. A wide range of approaches and tools have been proposed such as meta-heuristics. Among the most recent suggested meta-heuristics are: Cuckoo Search (CS) and Particle Swarm Optimization (PSO). The main contribution of this paper is to compare the performance of CS and PSO on the resource...
Article
Full-text available
The virtual machine (VM) workload of a datacenter is dynamic, where the reallocation of a subset of active VMs can result in better VM allocation by avoiding over-loaded/under-loaded physical machines (PMs). Over-loaded PMs lead to customer dissatisfaction, whereas under-loaded PMs result in increased energy consumption. In this work, we propose a...
Conference Paper
The Internet of Things (IoT) connects huge number of devices using the internet to collect data. The IoT has a variety of application domains, including health care. In these scenarios, the patient people can use wearable or implanted medical sensors for measuring medical parameters anywhere and anytime. However, the flourish of healthcare using th...
Conference Paper
Cloud robotics is incessantly gaining ground, especially with the rapid expansion of wireless networks and Internet resources. In particular, computation offloading is emerging as a new trend, enabling robots with more powerful computation resources. It helps them to overcome the hardware and software limitations by leveraging parallel computing ca...
Article
In this paper, we propose an IP-based mobility management protocol named Fast handover Proxy Mobile IPv6 for Sensor networks (FPMIPv6-S). FPMIPv6-S provides network-based mobility support for 6LoWPAN WSN when a sensor node moves between two Personal Area Networks (PANs). It is an improved version of the Proxy Mobile IPv6 (PMIPv6) [1] protocol propo...
Chapter
The emergence of the Internet of Things (IoT) is a result of convergence between multiple technologies, like Internet, wireless communication, embedded systems, microelectronic systems and nanotechnology. In 2016, 5.5 million objects are connected every day in the world. A number that could quickly reach billions by 2020 [1]. Gartner predicts that...
Article
Full-text available
We consider the problem of assigning a team of autonomous robots to target locations in the context of a disaster management scenario while optimizing several objectives. This problem can be cast as a multiple traveling salesman problem, where several robots must visit designated locations. This paper provides an analytical hierarchy process (AHP)-...
Chapter
In this paper, we propose an IP-based mobility management protocol named Fast handover Proxy Mobile IPv6 for Sensor networks (FPMIPv6-S). FPMIPv6-S provides network-based mobility support for 6LoWPAN WSN when a sensor node moves between two Personal Area Networks (PANs). It is an improved version of the Proxy Mobile IPv6 (PMIPv6) protocol proposed...
Article
Full-text available
Wireless sensor networks (WSNs) are finding application in numerous fields. For many of these applications, some or all of the sensor nodes are mobile. Mobility management in WSNs is a challenging and has been the subject of intensive research. In this paper, we propose an IP-based mobility management protocol named Fast handover Proxy Mobile IPv6...
Conference Paper
Full-text available
Global path planning consists in finding the optimal path for a mobile robot with the lowest cost in the minimum amount of time, without colliding with the obstacles scattered in the workspace. In this paper, we investigate the benefits of offloading path planning algorithms to be executed in the cloud rather than in the robot. The contribution con...
Article
Full-text available
The Internet of Things (IoT) is largely built on the interconnection of low-power networked devices, generally referred to as low-power and lossy networks (LLNs). The prime routing protocol designed over IPv6, named routing protocol for LLNs (RPL), presents the main effort to standardize an IPv6-based routing protocol for all LLNs. Routing protocol...
Article
Full-text available
The IoT (Internet of Things) is defined as a global infrastructure for the information society, which provides advanced services by interconnecting physical or virtual objects through existing interoperable information and communication technologies in evolution. To note, the explosion of the number of smartphones and connections has created a new...
Article
Full-text available
This paper considers the problem of assigning target locations to be visited by mobile robots. We formulate the problem as a multiple-depot multiple traveling salesman problem (MD-MTSP), an NP-Hard problem instance of the MTSP. In contrast to most previous works, we seek to optimize multiple performance criteria, namely the maximum traveled distanc...
Conference Paper
Full-text available
Internet of Things (IoT) applications are driving the world to be smart by providing limitless services with optimized time and resources. Security and safety are paramount to ensure the reliability of IoT applications. For this purpose, Intrusion Detection Systems (IDS) must be employed in order to discover the intrusions and to contain and possib...
Conference Paper
Today, more concerns are raised to Software Defined Networks (SDN) paradigm since it is a promising concept that offers programmability and scalability by decoupling control and data planes. However, many problems have arisen due to the huge amount of control messages exchanged periodically between the controller and Forwarding Elements (FE) and th...
Article
Full-text available
Secure communication of Internet of Things (IoT) devices relies on cryptographic approaches whose robustness is based on the security of encryption keys. For instance, an adequate key management scheme must be used to properly manage the used keys. Designing an efficient and robust key management scheme for the connected devices is a challenging ta...
Article
This article presents the results of the 2-year iroboapp research project that aims at devising path planning algorithms for large grid maps with much faster execution times while tolerating very small slacks with respect to the optimal path. We investigated both exact and heuristic methods. We contributed with the design, analysis, evaluation, imp...
Conference Paper
The use of sensor networks is increasing more and more in many areas, such as scientific, medical, domestic, military etc. However, such networks are still suffering from a power autonomy limitation that restricts the network lifetime. Energy is a vital component for WSNs. Namely, energy and material resources remain a major challenge for these typ...
Conference Paper
Despite the rapid development of WSNs and its increasing integrations in different areas, they remain very vulnerable to attacks because of their limitation of resources and their brittle use. Several trusted works have been developed for this purpose. Despite the robustness of the same trust model from literature, they do not take into account the...
Article
In this paper, the efficiency of genetic algorithm (GA) approach to address the problem of global path planning for mobile robots in large-scale grid environments is revisited and assessed. First, an efficient GA path planner to find an (or near) optimal path in a grid map is proposed. In particular, large maps instances are considered in this work, as...
Article
Full-text available
Cyber-Physical Systems (CPSs) represent systems where computations are tightly coupled with the physical world, meaning that physical data is the core component that drives computation. Industrial automation systems, wireless sensor networks, mobile robots and vehicular networks are just a sample of cyber-physical systems. Typically, CPSs have limi...
Article
Virtual private network (VPN) design according to a tree topology has been the subject of numerous research papers. Two workload models are commonly used to allow VPN clients to specify the communication capacity they need, the hose and the pipe workload models. As opposed to the pipe model, where bandwidth needs between every pair of endpoints mus...
Chapter
This tutorial presents how to integrate the Service-Oriented Architecture (SOA) paradigm into Robot Operating System (ROS). The main objective consists in exposing ROS ecosystem as a service that can be invoked by Web Services (WS) clients. This integration enables end-users and client applications to seamlessly interact with the ROS ecosystem via...
Article
Providing source authentication service in Wireless Sensor Networks (WSNs) is still a potential stumbling block to the wide deployment of these resource constrained devices. In this paper, we present several broadcast authentication solutions that have been developed for secure group communications in WSNs, and we come up with two novel symmetric-k...
Article
Medical Wireless Sensor Networks (MWSNs) provides efficient solutions to the ubiquitous healthcare systems. Deployment of MWSNs for healthcare monitoring minimizes the need for healthcare professionals and helps the patients and elderly people to survive easy an independent life. In hospitals, medical data sensors on patients produce an enormous vo...
Conference Paper
The cloud-based VANETs (Vehicular Ad-Hoc NETwork) will be deployed in the near future that is going to extend VANET applications to include multimedia services. Motivated by that fact, we build a video streaming framework over a cloud-based VANET architecture that is composed of a central cloud, roadside cloudlet and vehicular cloud. The video stre...
Article
Radio link quality estimation is essential for protocols and mechanisms such as routing, mobility management and localization, particularly for low-power wireless networks such as wireless sensor networks. Commodity Link Quality Estimators (LQEs), e.g. PRR, RNP, ETX, four-bit and RSSI, can only provide a partial characterization of links as they ig...
Conference Paper
Full-text keywords search of the Web over structured peer-to-peer networks shows promise to become an alternative to the state-of-the-art search engines since P2P overlays propose means for decentralized search across widely-distributed document collections. However, a disadvantage of structured P2P systems is that they consider only the problem of...
Article
Assigning tasks to a set of robots is a fundamental problem in robotics. It consists in finding the best task assignment to the available robots. In this paper, we present two distributed market-based algorithms to solve the assignment problem where n robots compete for n tasks with the assumption that each robot can be assigned to only one task. T...
Article
Full-text available
This paper investigates the capabilities of tabu search for solving the global path planning problem in grid maps. Accordingly, a tabu search system model is designed and a tabu search planner algorithm for solving the path planning problem is proposed. A comprehensive simulation study is conducted using the proposed model and algorithm, in terms o...
Article
Full-text available
Routing has been considered as one of the most important issues in 6LoWPAN [22] networks. For this reason, the Internet Engineering Task Force (IETF) has proposed a routing protocol called RPL (Routing Protocol for Low Power and Lossy Networks). This paper presents a performance evaluation of the repair mechanisms of RPL with storing mode, using th...
Conference Paper
Distributed wireless sensor network technologies have become one of the major research areas in healthcare industries due to rapid maturity in improving the quality of life. Medical Wireless Sensor Network (MWSN) via continuous monitoring of vital health parameters over a long period of time can enable physicians to make more accurate diagnosis and...
Article
In this paper, we studied Virtual Private Network Design Problem using tree structure and assuming a pipe traffic matrix. Today with network virtualization, Virtual Private Networks (VPNs) have more importance in networking and offers the company the ideal solution to establish ondemand overlay networks that enable their customers to securely acces...
Conference Paper
Full-text available
Source authentication in multicast communication is essential and challenging requirement. In this paper we address the multicast stream authentication problem when the communication channel is under the control of an opponent who can drop, reorder or inject data. In such a network model, robustness against packet loss, packet overhead and computin...
Article
The Virtual Private Networks (VPN) optimal bandwidth allocation problem with tree topology has been widely discussed in the literature. Most of the algorithms proposed by researchers to solve this problem use approximation schemes. In this paper, we propose an exact and efficient Branch-and-Cut algorithm for the problem in the context of a hose wor...
Conference Paper
Full-text available
Wireless Sensor Networks (WSNs) represent one of the most exciting today's research areas. Their utility ranges from causal sensing and data collection to mission critical applications such as battle field control, medical assistance, and natural disaster forecasting. With all the constraints related to WSNs, and with the urgent need to provide con...
Chapter
Several network protocols and mechanisms rely on efficient link quality estimation to mitigate the unreliability of low-power links. A LQE can be efficient on a per-link basis, but it may lead to a poor performance when integrated in a particular protocol or mechanism. The objective of this chapter is to show how to use link quality estimation for...
Chapter
An important factor contributing to the degradation and variability of the link quality is radio interference. The increasingly crowded radio spectrum has triggered a vast array of research activities on interference mitigation techniques and on enhancing coexistence among electronic devices sharing the same or overlapping frequencies. This chapter...
Chapter
This chapter aims at providing a summary of key properties of low-power links. First, it gives an overview of the radio technology most commonly used in low-power wireless networks. Then, it distils from the vast array of empirical studies on low-power links a set of high-level observations, which are classified into spatial and temporal characteri...
Chapter
Low-power links exhibit a complex and dynamic behavior, e.g., frequent quality fluctuations, highly asymmetric connectivity, large transitional region. They are more unreliable than traditional wireless links. This is due to the use of low-power and low-cost radio transceivers. These facts raised the need for link quality estimation as a fundamenta...
Chapter
The objective of this chapter is twofold: First, we present a methodology to evaluate the performance of LQEs regardless their type (e.g., PRR-based versus RNP or score-based, hardware-based vs. software-based). We follow this methodology to evaluate the performance of six representative and well-known LQEs in the literature. The results presented...
Conference Paper
Wireless sensor networks (WSNs) often consists of a large number of low-cost sensor nodes that have strictly limited sensing, computation, and communication capabilities. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes...
Article
The Quality of Service (QoS) provisioning paradigm has become highly complicated due to the rising of networks complexity, heterogeneity and unpredictability. This complexity resulted in the need to satisfy stringent user's QoS requirements which depends generally on network capabilities. To deal with this complexity, an autonomic management of th...
Conference Paper
In-network data aggregation is an effective method to reduce the amount of data transmitted and therefore saves energy consumption in sensor networks. However, an adversary may compromise some sensor nodes, and use them to forge false values as the aggregation result. Previous secure data aggregation schemes have tackled this problem from different...
Conference Paper
Internet Service providers offer today a variety of of audio, video and data services. Traditional approaches for quality assessment of video services were based on Quality of Service (QoS) measurement. These measurements are considered as performance measurement at the network level. However, in order to make accurate quality assessment, the video...
Conference Paper
Full-text available
Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption; consequently, tr...
Article
Natively, Multiprotocol Label Switching (MPLS) does not provide mechanisms to enable security basics. Today, the rising of Next Generation Networks (NGN) has motivated the need to secure MPLS. Unfortunately, little work has focused on the issue but it is considered unsatisfactory since it addresses security basics such as confidentiality, inte...
Conference Paper
Full-text available
Broadcast source authentication is a critical security service in wireless sensor networks which is still in its infancy. This service allows senders to broadcast messages to multiple receivers in a secure way. This paper evaluates the integration of staggered authentication in multi-level μTesla source authentication protocol called staggered mult...
Conference Paper
Full-text available
The problem of providing source authentication in Wireless Sensor Networks (WSNs) has been a roadblock to their large scale deployment, and is still in its infancy. In this paper, we present novel symmetric-key-based authentication schemes which exhibit low computation and communication authentication overhead. Our schemes are built upon the integr...
Book
Low-power wireless technologies have been major enablers for pervasive computing applications as diverse as environmental monitoring, smart buildings, plant process control, structural health monitoring and more generically any application under the smart cooperating objects and “Internet of Things” umbrella. However, the scalability requirements t...
Article
Full-text available
Wireless sensor networks are now in widespread use to monitor regions, detect events and acquire information. Since the deployed nodes are separated, they need to cooperatively communicate sensed data to the base station. To maximise WSN lifetime, it is essential to minimise the number of bits sent and received by each device. To reduce the amount...
Conference Paper
With the widespread growth in applications for resource limited Wireless Sensor Networks (WSN), the need for reliable and efficient security mechanisms for them has increased manifold but its implementation is a non-trivial task. Limitations in processing speed, battery power, bandwidth and memory constrain the applicability of existing cryptograph...
Conference Paper
IPv6 over Low power Wireless Personal Area Networks (6Lo-WPAN) is a protocol architecture that has recently been ratified to enable the seamless interconnection of wireless sensor networks (WSN) to the Internet. This opens up a wealth of application opportunities as well as a number of difficult challenges. One of these challenges is the efficient...
Conference Paper
Virtual Private Networks (VPNs) are overlay networks established on top of a public network backbone with the goal of providing a low cost but secure network solution. The allocation of bandwidth for VPN tunnels to meet the requirements specified by customers is an important traffic engineering research issue. This paper addresses the general probl...
Article
Radio link quality estimation in Wireless Sensor Networks (WSNs) has a fundamental impact on the network performance and also affects the design of higher-layer protocols. Therefore, for about a decade, it has been attracting a vast array of research works. Reported works on link quality estimation are typically based on different assumptions, cons...
Conference Paper
Technology advances and services of modern networks have noticeably complicated their management such that in the near future it will be almost unfeasible for human administrators to monitor them. To manage this complexity, IBM has proposed the autonomic paradigm with its four self-management properties. Autonomic computing/networking intends to de...
Conference Paper
The last decade has seen the emergence of the concept of converged IP networks, which make use of a multitude of heterogeneous core and access networks. We have also witnessed the proliferation of numerous multimedia services such as audio/video streaming, VoIP, or IPTV. The users' satisfaction and the perceived quality are being recognized as cruc...
Conference Paper
Full-text available
Mobility in wireless sensor networks is an element which directly influences the network performance. Indeed, with an architecture based on the IP stack, a mobile node has to maintain connectivity with other sensors, also allowing connectivity to the Internet. Among IPv6 based protocols proposed for mobility management, we find Mobile IPv6 (MIPv6),...
Conference Paper
This paper presents a new solution for inter-domain recovery within MPLS networks. The proposed mechanism is based on efficient collaboration between several entities called PCEs (Path Computation Elements). One PCE is designated at each domain. All PCEs should communicate in order to ensure suitable End-to-End(E2E) failure handling, recovery and r...