About
262
Publications
94,343
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,662
Citations
Introduction
Publications
Publications (262)
Dynamic and autonomous SideLink (SL) Radio Resource Management (RRM) is essential for platoon-based cellular vehicular networks. However, this task is challenging due to several factors. These include the limited spectrum below 6 GHz, stringent vehicle-to-everything (V2X) communications requirements, uncertain and dynamic environments, limited vehi...
Indoor positioning systems and Air Quality (AQ) monitoring play a crucial role in creating smart environments that promote human well-being and sustainable living.This research paper explores the integration of Software-Defined Networking (SDN) with a Pozyx-based indoor positioning system for advanced AQ monitoring. By addressing the current challe...
As a growing up-and-coming branch of the Internet of Things and traditional vehicular ad hoc networks, the Internet of Vehicles (IoV) is intended to perform as a core information carrying and processing platform for Intelligent Transport Systems. However, owing to its dynamic topological structures, large network scale, and mobile limitation, IoV s...
Unmanned Aerial Vehicles (UAVs) have become an integral part of modern smart cities and systems. However, the proliferation of UAVs has also brought a significant security concern. Therefore, UAVs security has attracted the interest of researchers in the field. To safeguard these leading devices, researchers and developers adopted artificial intell...
Vehicular networks have become a critical component of modern transportation systems by facilitating communication between vehicles and infrastructure. Nonetheless, the security of such networks remains a significant concern, given the potential risks associated with cyberattacks. For this purpose, artificial intelligence approaches have been explo...
Maximizing the energy saving is one of the most important metrics in 5G and Beyond (B5G) cellular mobile networks. In order to satisfy the diverse requirements of 5G/B5G in dynamic environments, Reinforcement Learning (RL) is proven as a viable approach for solving resource management problems, especially for 5G energy resources. In this paper, we...
Internet of Things (IoT) is creating a new automated environment where human interaction is limited, in which smart-physical objects obtain the power to produce, acquire, and exchange data seamlessly. Hence, diverse IoT systems concentrate on automating various tasks. These automated applications and systems are highly promising to increase user sa...
This study proposes a capacitated vehicle routing problem (CVRP) approach to optimise Vehicle Routing Problem (VRP) and pesticides spraying. The VRP consists of finding the route which covers every point of a certain area of interest. This paper considers a search and pesticides spraying mission, using group of Unmanned Aerial Vehicles (UAVs). In t...
Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and...
During the last decade, wireless data services have had an incredible impact on people’s lives in ways we could never have imagined. The number of mobile devices has increased exponentially and data traffic has almost doubled every year. Undoubtedly, the rate of growth will continue to be rapid with the explosive increase in demands for data rates,...
Industry experts anticipate that Internet of Things (IoT)-based Immersive Visual Technologies (IVT) will revolutionize air quality applications. However, the enormous variety of IoT and IVT poses a significant challenge, impeding widespread adoption in both domains. To fully harness the potential of IoT and IVT in air quality applications, we must...
A resilient and guaranteed Unmanned Aerial Vehicles (UAVs) security framework should be designed to be secure against different types of attacks and faults. Recent developments have seen a proliferation of methods for improving UAVs security. Although, many studies proposed different approaches using artificial intelligence to enhance their securit...
Nowadays, blockchain has become increasingly popular due to its promise of supporting critical business services in various areas. Blockchain systems, like Ethereum and Hyperledger Fabric, rely on sophisticated middleware, which enables the execution of smart contracts. Smart contracts define the business logic within cooperative applications. Dete...
Industry 4.0 is going through a transitional period via the radically automotive transformations. In particular, unmanned aerial vehicles have significantly contributed to the development of intelligent and connected transportation systems. Thus, the continuous development using diverse technologies to achieve a variety of high-performance services...
Security issues of unmanned aerial vehicles (UAVs) have received great attention. A new dataset named UKM-IDS20 has been recently developed for intrusion detection in UAVs to distinguish between abnormal and normal behaviors. The feature selection process in datasets is essential in improving IDSs performance. Decreasing features reduces the comple...
Network slicing (NS) has emerged as a promising solution that enables network operators to slice network resources such as spectrum and bandwidth to adapt to different beyond 5G scenarios. This allows new operators to enter the market: the infrastructure provider (InP), who owns the infrastructure, and the mobile virtual network operator (MVNO), wh...
The drone, also known as an unmanned aerial vehicle (UAV), offers significant advantages for precision agriculture by reducing the need for conventional farming practices that require more manpower. The use of drones in agriculture offers significant economic and time-saving benefits. The evaluation of UAVs’ performance is urgently needed in light...
We are now in the first phase of the Fifth Generation (5G) network, and its full potential is still a long way
to reach. Network operators and manufacturers are preparing
to release new 5G end-users services and products. Each
service must be performant to meet the need of users. Network
Slicing (NS) is now one of the most popular 5G technologies
i...
Rapid advancements in communication technology have made vehicular networks a reality with numerous applications. However, vehicular network security is still an open research problem. Artificial intelligence (AI) techniques have emerged to address these issues. AI and its variants are becoming more popular for detecting attacks and dealing with ma...
The LoRaWAN standard comes from a Low Power Wide Area Network (LPWAN) technology suitable for developing Internet of Things (IoT) systems that are poised to disrupt the semiconductor industry. Even as a widespread technology used for diverse applications, security issues of long range (LoRa) networks and devices still remain a major challenge. Alth...
For patients with geriatric medical specialty disorders equivalent to dementia, patients with ingrained devices such as pacemakers. The quantity of exercise and therefore the amount of daylight are important guides for dosing and treatment, thus observation daily health info is important to patient safety and health. A portable, wearable device and...
Recently, the internet of things (IoT) has gained popularity as an enabling technology for wireless connectivity of mobile and/or stationary devices providing useful services for the general public in a collaborative manner. Mobile ad-hoc networks (MANETs) are regarded as a legacy enabling technology for various IoT applications. Vehicular ad-hoc n...
During the last decade, Unmanned Aerial Vehicles (UAVs) gained wide attention and are integrated into diverse systems and deployed into many contexts. The need to assess the UAVs’ performances, impacts of applications, routing protocols, mobility as well as other features in a network is necessary. However, conducting real experiments within UAV-ba...
Recently, cooperative Unmanned Aerial Vehicles (UAVs) have been used in several complex military and civilian applications. Mobile Target Search (MTS) and Mobile Target Tracking (MTT) are among the UAV-based applications that require the involvement of cooperative UAVs. Accordingly, this paper proposes a cooperative UAVs framework for MTS and MTT n...
LoRaWAN is a low power wide area network (LPWAN) technology protocol introduced by the LoRa Alliance in 2015. It was designed for its namesake features: long range, low power, low data rate, and wide area networks. Over the years, several proposals on protocol specifications have addressed various challenges in LoRaWAN, focusing on its architecture...
In recent years, technologies related to indoor and outdoor air quality monitoring systems have been growing rapidly, particularly computing and communication technologies. Accordingly, the integration of the Internet of things within these novel emerging technologies provides a promising opportunity for the development of air quality systems, whic...
Structural Health Monitoring (SHM)
is progressively developing as an essential process to insure maintenance and conservation of the structural heritage. SHM provides not only the safety of the building but also its historical and cultural value. Nowadays, Wireless Sensor Networks (WSN) are widely used for SHM presenting a prominent candidate to so...
A non-predicted defect in Unmanned Aerial Vehicles (UAVs) could occur provisionally during their deployment process. Consequently, it is critical to optimize the detection of these instances. More specifically, the deviations in normal behavior indicate the possibility of triggered attacks, failures, and flaws. Therefore, intrusion detection (ID) i...
The explosion of traffic demand combined with increasingly complex heterogeneous network (HetNet) infrastructures, has presented ever more challenges for mobile network operators such as QoS, autonomous network management and energy efficiency (EE). In this paper, we present an energy-efficient solution considering the Self-Organizing Network (SON)...
The internet of vehicles (IoV), a variant of the traditional VANET, allows real-time data exchange between vehicles, roadside units, parking, and city infrastructure. Nevertheless, the IoV poses many security concerns due to its open nature. Traditional security solutions may not address all the IoV security risks and provide complete protection. T...
Unmanned aerial vehicles (UAVs) are the current leading devices used by different sectors. They open doors to new opportunities for investors and business service providers. Their exponential growth turns the visibility of attackers to a new target to implement attacks. Researchers aim to fend off these attacks to empower UAVs security. Based on th...
A new generation of systems appeared with the birth of Cyber-Physical Systems (CPS) that integrated computational and physical capabilities. CPS represents an emerging domain as it has an important interest in the literature due to its interaction with Structural Health Monitoring System applications. In this paper, we present a deep investigation...
Water stress and water scarcity have become crucial global issues in recent past years. To cope with these issues, Smart Water Grid (SWG) that integrates Information and Communication Technologies (ICT) into traditional water distribution systems has been proposed as a potential solution. SWG installs to customers' premise smart water metering devi...
Energy-saving (ES) is becoming one of the most challenging tasks that fifth-generation (5G) tends to tackle. The problem of identifying the optimal set cells to be turned
off
is nondeterministic polynomial time-hard. In this research article, we use heuristic algorithms to save energy in 5G heterogeneous networks (HetNet). Our approach is based o...
Low PowerWide Area Networks (LPWANs) are becoming the most suitable communication technologies in the Internet of Things (IoT) applications due to their low power consumption, long communication range and low cost. Currently, Long Range Wide Area Network (LoRaWAN) is one of the most popular LPWANs. Because it offers the possibility to build private...
In recent years, the emergence of the Internet of Vehicles (IoV) aims to enhance the users’ quality of experience through proposing more sophisticated services ranging from guaranteeing the user safety to improving his comfort. The IoV ecosystem is complex, heterogeneous, and evolving. Many entities participate to compose its architecture (such as...
Relaying technology is one of the LTE-A issue that is considered the area of concern of several researches. Thus LTE-Advanced with relays uses several enhanced techniques in order to improve network performance like cell throughput enhancement and coverage extension. LTE-Advanced is considered as a real evolution of the LTE as it develops new techn...
The Internet of things (IoT) is a new ubiquitous technology that relies on heterogeneous devices and protocols.
The IoT technologies are expected to offer a new level of connectivity thanks to its smart devices able to enhance everyday tasks and facilitate smart decisions based on sensed data. The IoT could collect sensitive data and should be able...
In recent years, the use of information-centric networks (ICNs) within vehicular ad hoc networks (VANETs) has been shown to be a favourable and deployable future Internet paradigm. Within the context of VANETs, the use of ICNs has many advantages. Indeed, ICNs offer the benefit of in-network content caching and strategies. In addition, ICNs acceler...
Self-Organizing Network (SON) stands for a key concept characterizing the behavior of the future mobile networks. The evolution of telecom infrastructures towards 5G transforms the network management from the traditional and static processes to automatic and dynamic ones. SON was proposed to offer agile on-demand services to the users through provi...
During this last decade, the blockchain (BC) paradigm has been required in several use cases and scenarios in particular for security, privacy, and trust provisioning. Accordingly, several studies proposed the use of BC technology to secure and to assure the trustworthiness of unmanned aerial vehicles (UAVs). In this context, this chapter highlight...
In recent years, the surge of blockchain technology has been rising due to is proven reliability in ensuring secure and effective transactions, even between untrusted parties. Its application is broad and covers public and private domains varying from traditional communication networks to more modern networks like the internet of things and the int...
Internet of Vehicles (IoV) is one of the attractive solutions that revolutionized automotive services. IoV is the key concept toward smart and autonomous cars. Providing different wireless connectivity’s for vehicles permits the communication inside and outside the vehicle. These connectivities allow the vehicle to interact with other vehicles and...
Healthcare remote monitoring applications dominate the market of new technologies due to their valuable aid to patients, families, and medical staff. They provide ubiquitous remote health services for patients with chronic diseases or specific conditions and can provide ubiquitous communication between patients and caregiver(s). This paper presents...
Network slicing (NS) presents the key enabler of cellular network improvements. It allows enhancing the performance of diverse requirements supported for verticals industries. The concept of NS was carefully studied over the previous few years, and the primary operational principles were developed. However, there is an important need for more inves...
5G is not a simple cellular technology; it's a real revolution to improve the connection speed that assures Quality of Service (QoS) requirements and user satisfaction in a heterogeneous environment. 5G network is considered as a Het- erogeneous Networks (HetNets) able to support a multitude of speci c use cases (such as Smart Metering and Videocon...
Software‐defined networking (SDN) is a new paradigm that consists in decoupling the control plane from the data plane, which offers the flexibility of configuring and managing networks. Recently, an extension of SDN to vehicular ad hoc networks (VANETs), named software‐defined vehicular networks (SDVN), has been emerged to expand the capabilities o...
Internet of Vehicles (IoV) brings new specific vehicular use cases further from Vehicular Ad-hoc Networks (VANETs) and offers sophisticated applications for more efficient Intelligent Transport Systems (ITS) in which autonomous driving technology is the quantum leap in smart connected vehicles. However, this innovation brings a security concern and...
5G cellular networks are expected to be the key infrastructure to deliver the emerging services. These services bring new requirements and challenges that obstruct the desired goal of forthcoming networks. Mobile operators are rethinking their network design to provide more flexible, dynamic, cost-effective and intelligent solutions. This paper sta...
Due to the aging of current water infrastructure and the increased demand for water resources, water distribution systems encounter several problems such as pipes leaks and bursts, water contamination or pollution, and water optimization issues. To cope with these issues, access to water-related data and information related to the water grid is fun...
During this last decade, the blockchain (BC) paradigm is being required in several use cases and scenarios in particular for security, privacy, and trust provisioning. Accordingly, the research community and developers developed several emulation tools and frameworks for BC-based systems performance analysis. Making an adequate decision regarding t...