Lamia Chaari Fourati

Lamia Chaari Fourati
  • Professor in telecommunications at computer science and multimedia higher institute
  • National Engineering School of Sfax

About

262
Publications
94,343
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,662
Citations

Publications

Publications (262)
Article
Dynamic and autonomous SideLink (SL) Radio Resource Management (RRM) is essential for platoon-based cellular vehicular networks. However, this task is challenging due to several factors. These include the limited spectrum below 6 GHz, stringent vehicle-to-everything (V2X) communications requirements, uncertain and dynamic environments, limited vehi...
Article
Full-text available
Indoor positioning systems and Air Quality (AQ) monitoring play a crucial role in creating smart environments that promote human well-being and sustainable living.This research paper explores the integration of Software-Defined Networking (SDN) with a Pozyx-based indoor positioning system for advanced AQ monitoring. By addressing the current challe...
Article
Full-text available
As a growing up-and-coming branch of the Internet of Things and traditional vehicular ad hoc networks, the Internet of Vehicles (IoV) is intended to perform as a core information carrying and processing platform for Intelligent Transport Systems. However, owing to its dynamic topological structures, large network scale, and mobile limitation, IoV s...
Article
Unmanned Aerial Vehicles (UAVs) have become an integral part of modern smart cities and systems. However, the proliferation of UAVs has also brought a significant security concern. Therefore, UAVs security has attracted the interest of researchers in the field. To safeguard these leading devices, researchers and developers adopted artificial intell...
Article
Full-text available
Vehicular networks have become a critical component of modern transportation systems by facilitating communication between vehicles and infrastructure. Nonetheless, the security of such networks remains a significant concern, given the potential risks associated with cyberattacks. For this purpose, artificial intelligence approaches have been explo...
Article
Maximizing the energy saving is one of the most important metrics in 5G and Beyond (B5G) cellular mobile networks. In order to satisfy the diverse requirements of 5G/B5G in dynamic environments, Reinforcement Learning (RL) is proven as a viable approach for solving resource management problems, especially for 5G energy resources. In this paper, we...
Article
Full-text available
Internet of Things (IoT) is creating a new automated environment where human interaction is limited, in which smart-physical objects obtain the power to produce, acquire, and exchange data seamlessly. Hence, diverse IoT systems concentrate on automating various tasks. These automated applications and systems are highly promising to increase user sa...
Article
Full-text available
This study proposes a capacitated vehicle routing problem (CVRP) approach to optimise Vehicle Routing Problem (VRP) and pesticides spraying. The VRP consists of finding the route which covers every point of a certain area of interest. This paper considers a search and pesticides spraying mission, using group of Unmanned Aerial Vehicles (UAVs). In t...
Article
Full-text available
Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and...
Article
During the last decade, wireless data services have had an incredible impact on people’s lives in ways we could never have imagined. The number of mobile devices has increased exponentially and data traffic has almost doubled every year. Undoubtedly, the rate of growth will continue to be rapid with the explosive increase in demands for data rates,...
Article
Full-text available
Industry experts anticipate that Internet of Things (IoT)-based Immersive Visual Technologies (IVT) will revolutionize air quality applications. However, the enormous variety of IoT and IVT poses a significant challenge, impeding widespread adoption in both domains. To fully harness the potential of IoT and IVT in air quality applications, we must...
Article
Full-text available
A resilient and guaranteed Unmanned Aerial Vehicles (UAVs) security framework should be designed to be secure against different types of attacks and faults. Recent developments have seen a proliferation of methods for improving UAVs security. Although, many studies proposed different approaches using artificial intelligence to enhance their securit...
Article
Full-text available
Nowadays, blockchain has become increasingly popular due to its promise of supporting critical business services in various areas. Blockchain systems, like Ethereum and Hyperledger Fabric, rely on sophisticated middleware, which enables the execution of smart contracts. Smart contracts define the business logic within cooperative applications. Dete...
Conference Paper
Full-text available
Industry 4.0 is going through a transitional period via the radically automotive transformations. In particular, unmanned aerial vehicles have significantly contributed to the development of intelligent and connected transportation systems. Thus, the continuous development using diverse technologies to achieve a variety of high-performance services...
Chapter
Security issues of unmanned aerial vehicles (UAVs) have received great attention. A new dataset named UKM-IDS20 has been recently developed for intrusion detection in UAVs to distinguish between abnormal and normal behaviors. The feature selection process in datasets is essential in improving IDSs performance. Decreasing features reduces the comple...
Article
Full-text available
Network slicing (NS) has emerged as a promising solution that enables network operators to slice network resources such as spectrum and bandwidth to adapt to different beyond 5G scenarios. This allows new operators to enter the market: the infrastructure provider (InP), who owns the infrastructure, and the mobile virtual network operator (MVNO), wh...
Article
Full-text available
The drone, also known as an unmanned aerial vehicle (UAV), offers significant advantages for precision agriculture by reducing the need for conventional farming practices that require more manpower. The use of drones in agriculture offers significant economic and time-saving benefits. The evaluation of UAVs’ performance is urgently needed in light...
Article
Full-text available
We are now in the first phase of the Fifth Generation (5G) network, and its full potential is still a long way to reach. Network operators and manufacturers are preparing to release new 5G end-users services and products. Each service must be performant to meet the need of users. Network Slicing (NS) is now one of the most popular 5G technologies i...
Article
Rapid advancements in communication technology have made vehicular networks a reality with numerous applications. However, vehicular network security is still an open research problem. Artificial intelligence (AI) techniques have emerged to address these issues. AI and its variants are becoming more popular for detecting attacks and dealing with ma...
Article
Full-text available
The LoRaWAN standard comes from a Low Power Wide Area Network (LPWAN) technology suitable for developing Internet of Things (IoT) systems that are poised to disrupt the semiconductor industry. Even as a widespread technology used for diverse applications, security issues of long range (LoRa) networks and devices still remain a major challenge. Alth...
Article
Full-text available
For patients with geriatric medical specialty disorders equivalent to dementia, patients with ingrained devices such as pacemakers. The quantity of exercise and therefore the amount of daylight are important guides for dosing and treatment, thus observation daily health info is important to patient safety and health. A portable, wearable device and...
Chapter
Recently, the internet of things (IoT) has gained popularity as an enabling technology for wireless connectivity of mobile and/or stationary devices providing useful services for the general public in a collaborative manner. Mobile ad-hoc networks (MANETs) are regarded as a legacy enabling technology for various IoT applications. Vehicular ad-hoc n...
Article
During the last decade, Unmanned Aerial Vehicles (UAVs) gained wide attention and are integrated into diverse systems and deployed into many contexts. The need to assess the UAVs’ performances, impacts of applications, routing protocols, mobility as well as other features in a network is necessary. However, conducting real experiments within UAV-ba...
Article
Recently, cooperative Unmanned Aerial Vehicles (UAVs) have been used in several complex military and civilian applications. Mobile Target Search (MTS) and Mobile Target Tracking (MTT) are among the UAV-based applications that require the involvement of cooperative UAVs. Accordingly, this paper proposes a cooperative UAVs framework for MTS and MTT n...
Article
Full-text available
LoRaWAN is a low power wide area network (LPWAN) technology protocol introduced by the LoRa Alliance in 2015. It was designed for its namesake features: long range, low power, low data rate, and wide area networks. Over the years, several proposals on protocol specifications have addressed various challenges in LoRaWAN, focusing on its architecture...
Article
In recent years, technologies related to indoor and outdoor air quality monitoring systems have been growing rapidly, particularly computing and communication technologies. Accordingly, the integration of the Internet of things within these novel emerging technologies provides a promising opportunity for the development of air quality systems, whic...
Chapter
Full-text available
Structural Health Monitoring (SHM) is progressively developing as an essential process to insure maintenance and conservation of the structural heritage. SHM provides not only the safety of the building but also its historical and cultural value. Nowadays, Wireless Sensor Networks (WSN) are widely used for SHM presenting a prominent candidate to so...
Conference Paper
Full-text available
A non-predicted defect in Unmanned Aerial Vehicles (UAVs) could occur provisionally during their deployment process. Consequently, it is critical to optimize the detection of these instances. More specifically, the deviations in normal behavior indicate the possibility of triggered attacks, failures, and flaws. Therefore, intrusion detection (ID) i...
Chapter
The explosion of traffic demand combined with increasingly complex heterogeneous network (HetNet) infrastructures, has presented ever more challenges for mobile network operators such as QoS, autonomous network management and energy efficiency (EE). In this paper, we present an energy-efficient solution considering the Self-Organizing Network (SON)...
Conference Paper
Full-text available
The internet of vehicles (IoV), a variant of the traditional VANET, allows real-time data exchange between vehicles, roadside units, parking, and city infrastructure. Nevertheless, the IoV poses many security concerns due to its open nature. Traditional security solutions may not address all the IoV security risks and provide complete protection. T...
Article
Unmanned aerial vehicles (UAVs) are the current leading devices used by different sectors. They open doors to new opportunities for investors and business service providers. Their exponential growth turns the visibility of attackers to a new target to implement attacks. Researchers aim to fend off these attacks to empower UAVs security. Based on th...
Article
Full-text available
A new generation of systems appeared with the birth of Cyber-Physical Systems (CPS) that integrated computational and physical capabilities. CPS represents an emerging domain as it has an important interest in the literature due to its interaction with Structural Health Monitoring System applications. In this paper, we present a deep investigation...
Article
Water stress and water scarcity have become crucial global issues in recent past years. To cope with these issues, Smart Water Grid (SWG) that integrates Information and Communication Technologies (ICT) into traditional water distribution systems has been proposed as a potential solution. SWG installs to customers' premise smart water metering devi...
Article
Energy-saving (ES) is becoming one of the most challenging tasks that fifth-generation (5G) tends to tackle. The problem of identifying the optimal set cells to be turned off is nondeterministic polynomial time-hard. In this research article, we use heuristic algorithms to save energy in 5G heterogeneous networks (HetNet). Our approach is based o...
Article
Full-text available
Low PowerWide Area Networks (LPWANs) are becoming the most suitable communication technologies in the Internet of Things (IoT) applications due to their low power consumption, long communication range and low cost. Currently, Long Range Wide Area Network (LoRaWAN) is one of the most popular LPWANs. Because it offers the possibility to build private...
Article
In recent years, the emergence of the Internet of Vehicles (IoV) aims to enhance the users’ quality of experience through proposing more sophisticated services ranging from guaranteeing the user safety to improving his comfort. The IoV ecosystem is complex, heterogeneous, and evolving. Many entities participate to compose its architecture (such as...
Article
Full-text available
Relaying technology is one of the LTE-A issue that is considered the area of concern of several researches. Thus LTE-Advanced with relays uses several enhanced techniques in order to improve network performance like cell throughput enhancement and coverage extension. LTE-Advanced is considered as a real evolution of the LTE as it develops new techn...
Article
Full-text available
The Internet of things (IoT) is a new ubiquitous technology that relies on heterogeneous devices and protocols. The IoT technologies are expected to offer a new level of connectivity thanks to its smart devices able to enhance everyday tasks and facilitate smart decisions based on sensed data. The IoT could collect sensitive data and should be able...
Article
In recent years, the use of information-centric networks (ICNs) within vehicular ad hoc networks (VANETs) has been shown to be a favourable and deployable future Internet paradigm. Within the context of VANETs, the use of ICNs has many advantages. Indeed, ICNs offer the benefit of in-network content caching and strategies. In addition, ICNs acceler...
Article
Self-Organizing Network (SON) stands for a key concept characterizing the behavior of the future mobile networks. The evolution of telecom infrastructures towards 5G transforms the network management from the traditional and static processes to automatic and dynamic ones. SON was proposed to offer agile on-demand services to the users through provi...
Chapter
During this last decade, the blockchain (BC) paradigm has been required in several use cases and scenarios in particular for security, privacy, and trust provisioning. Accordingly, several studies proposed the use of BC technology to secure and to assure the trustworthiness of unmanned aerial vehicles (UAVs). In this context, this chapter highlight...
Book
In recent years, the surge of blockchain technology has been rising due to is proven reliability in ensuring secure and effective transactions, even between untrusted parties. Its application is broad and covers public and private domains varying from traditional communication networks to more modern networks like the internet of things and the int...
Preprint
Full-text available
Internet of Vehicles (IoV) is one of the attractive solutions that revolutionized automotive services. IoV is the key concept toward smart and autonomous cars. Providing different wireless connectivity’s for vehicles permits the communication inside and outside the vehicle. These connectivities allow the vehicle to interact with other vehicles and...
Article
Healthcare remote monitoring applications dominate the market of new technologies due to their valuable aid to patients, families, and medical staff. They provide ubiquitous remote health services for patients with chronic diseases or specific conditions and can provide ubiquitous communication between patients and caregiver(s). This paper presents...
Article
Network slicing (NS) presents the key enabler of cellular network improvements. It allows enhancing the performance of diverse requirements supported for verticals industries. The concept of NS was carefully studied over the previous few years, and the primary operational principles were developed. However, there is an important need for more inves...
Preprint
Full-text available
5G is not a simple cellular technology; it's a real revolution to improve the connection speed that assures Quality of Service (QoS) requirements and user satisfaction in a heterogeneous environment. 5G network is considered as a Het- erogeneous Networks (HetNets) able to support a multitude of speci c use cases (such as Smart Metering and Videocon...
Article
Full-text available
Software‐defined networking (SDN) is a new paradigm that consists in decoupling the control plane from the data plane, which offers the flexibility of configuring and managing networks. Recently, an extension of SDN to vehicular ad hoc networks (VANETs), named software‐defined vehicular networks (SDVN), has been emerged to expand the capabilities o...
Chapter
Internet of Vehicles (IoV) brings new specific vehicular use cases further from Vehicular Ad-hoc Networks (VANETs) and offers sophisticated applications for more efficient Intelligent Transport Systems (ITS) in which autonomous driving technology is the quantum leap in smart connected vehicles. However, this innovation brings a security concern and...
Article
Full-text available
5G cellular networks are expected to be the key infrastructure to deliver the emerging services. These services bring new requirements and challenges that obstruct the desired goal of forthcoming networks. Mobile operators are rethinking their network design to provide more flexible, dynamic, cost-effective and intelligent solutions. This paper sta...
Article
Due to the aging of current water infrastructure and the increased demand for water resources, water distribution systems encounter several problems such as pipes leaks and bursts, water contamination or pollution, and water optimization issues. To cope with these issues, access to water-related data and information related to the water grid is fun...
Chapter
During this last decade, the blockchain (BC) paradigm is being required in several use cases and scenarios in particular for security, privacy, and trust provisioning. Accordingly, the research community and developers developed several emulation tools and frameworks for BC-based systems performance analysis. Making an adequate decision regarding t...

Network

Cited By