About
255
Publications
49,665
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,654
Citations
Publications
Publications (255)
Significant advancements in Cooperative and Autonomous Driving via Vehicle-to-everything (V2X) communications owe much to the rapid expansion and technological progress in vehicular communications, promising benefits like enhanced traffic flow and reduced energy consumption. However, this reliance on connected vehicles opens new security vulnerabil...
Vehicular Ad-Hoc Networks (VANETs) are susceptible to various types of attacks due to their characteristics. Among these threats, greedy behaviour attacks stand out, necessitating the update and adaptation of security measures to mitigate this evolving threat. While much of the existing literature on greedy behaviour attacks has focused on the CSMA...
Population growth, specific care for the aged or people suffering from chronic illnesses and the evolution of medical pathologies are some of the major challenges facing the healthcare sector. New technologies offer a solution to these
challenges, enabling the development of preventive medicine.
e-Health, a fast-growing field based on new informati...
In recent years, there has been significant growth in mobile wireless sensor networks (WSNs), yet prevailing research has primarily focused on 2D planar deployments, overlooking the importance of three-dimensional (3D) coverage in various applications. This oversight leads to ineffective data gathering due to incomplete area coverage and network co...
In the current era of agricultural robotization, it is necessary to use a suitable automated data collection system for constant plant, animal, and machine monitoring. In this context, cloud computing (CC) is a well-established paradigm for building service-centric farming applications. However, the huge amount of data has put an important burden o...
The integration of the Internet of Things (IoT) with blockchain technology has enabled a significant digital transformation in the areas of E‐health, supply chain, financial services, smart grid, and automated contracts. Many E‐health organizations take advantage of the game‐changing power of blockchain and IoT to improve patient outcomes and optim...
The integration of information and communication technologies (ICT) can be of great utility in monitoring and evaluating
the elderly’s health condition and its behavior in performing Activities of Daily Living (ADL) in the perspective to avoid, as
long as possible, the delays of recourse to health care institutions (e.g., nursing homes and hospital...
The password-based authentication mechanism is considered as the oldest and the most used method. It is easy to implement, and it does not require any particular configuration or devices. Yet, this solution does not ensure a high level of security when it is used in a large and remote environment such as cloud computing. In such an environment, the...
Vehicular Ad hoc Networks (VANETs), while promising new approaches to improving road safety, must be protected from a variety of threats. Greedy behavior attacks at the level of the Medium Access (MAC) Layer can have devastating effects on the performance of a VANET. This kind of attack has been extensively studied in contention-based MAC protocols...
Smart Vehicle applications are generally designed to ensure the driver’s and passenger’s safety as well as to improve the traffic management and provide convenience services. On the other hand, the researchers and industrialists consider Electric Vehicle as a key technology contributing to the reduction of CO2 emissions. Many attacks, such as vehic...
Distributed Denial of Service (DDoS) attacks remain one of the most effective cybercriminals methods to cause significant financial and operational damage. In Cloud Computing, these attacks’ goal is to shut down cloud servers, flooding them with traffic from compromised devices or networks. To address these issues, we offer SMC, a new approach to p...
In cognitive radio networks, collaborative spectrum sensing as a promising approach is widely investigated for better spectrum management in many emergent applications suffering from spectrum scarcity such as 5G, IoT, Vanet, etc. However, such cooperation is vulnerable to being threatened by malicious users. To this end, we introduce a hierarchical...
Driven by long traffic jams and numerous road accidents, vehicle networks (Vehicular Ad hoc NETwork, VANET) have emerged to make the journey more pleasant, the road safer and the transport system more efficient. Today’s vehicle network architectures suffer from scalability issues as it is challenging to deploy services on a large scale. These archi...
Trust management systems give way to trustworthy interactions in cloud computing. However, malicious cloud users can intentionally provide unfair ratings to benefit or reduce a cloud provider’s reputation. This paper proposes a novel detection strategy to supervise cloud users’ feedback and detect unfair rating attacks for cloud environments based...
The Internet of Medical Things (IoMT) communication systems are increasingly using wireless networks. However, the use of these networks for such critical systems raised some issues and problems such as the need of allowing more autonomy to the patient with anywhere and anytime monitoring capabilities. Cognitive radio (CR) can be a suitable solutio...
High accuracy air pollution monitoring in a smart city requires the deployment of a huge number of sensors in this city. One of the most appropriate wireless technologies expected to support high density deployment is LoRaWAN which belongs to the Low Power Wide Area Network (LPWAN) family and offers long communication range, multi-year battery life...
With the Internet of Things (IoT), the number of monitoring applications deployed is considerably increasing, whatever the field considered: smart city, smart agriculture, environment monitoring, air pollution monitoring, to name a few. The LoRaWAN (Long Range Wide Area Network)architecture with its long range communication, its robustness to inter...
Multicast communication stands as one of the most interesting and promising research areas. It helped to explore various research opportunities, especially, the ones that deal with the sensitivity to the rate diversity, or the multi-user diversity (MUD). In multicast communication, MUD means that the sender can serve the intended receivers using on...
The ciphertext policy is a promising cryptographic technique for smart home data security, and the secrecy of the encryption key purely depends on the security of the key derivation mechanism. In a smart home network, many devices have limited computational and communication resources, and any such mechanism to create a security key should consider...
In resource-constrained Wireless Body Area Net-works (WBAN), one of the fundamental challenges is to providesustainable e-health service. We here investigate time resourceallocation for e-health applications with energy harvestingenabled sensor nodes to maximize the overall network lifetime.The allocation is processed by a central node that execute...
A smart home interconnects every object of our living space to the Internet. Based on various technologies and standards, many device suppliers propound an expanded range of devices, that are incorporated in the home environment, in order to ease the human’s life and everyday duties. Among the most promising smart home applications, we distinguish...
Cloud Computing is the most promising paradigm in recent times. It offers on-demand services to individuals and industries. However, outsourcing sensitive data to entrusted Cloud servers impedes the adoption of Cloud concept. Security presents the most important issue. Consequently, Cloud service provider should implement fine grained access contro...
Remote control his smart home from his mobile device is highly desirable for a mobile user. But, the sensor devices and the user mobile device communicate over an insecure communication channel. Therefore, various attacks are possible, such as impersonation attack, privileged-insider attack, mobile device stolen attack, and the denial of service at...
In recent years, many consumers are storing a large amount of data in the cloud, so the security of this data is very important for users and companies. The companies need to provide secure data for consumers and to offer resource access only when it is needed. For this purpose, consumers require a much higher degree of authentication, such as stro...
Unmanned Aerial Vehicles (UAVs) based systems are a suitable solution for monitoring, more particularly for traffic monitoring. The mobility, the low cost, and the broad view range of UAVs make them an attractive solution for traffic monitoring of city roads. UAVs are used to collect and send information about vehicles and unusual events to a traff...
The increasing proliferation of Cloud Services (CSs) has made the reliable CS selection problem a major challenge. To tackle this problem, this article introduces a new trust model called Chain Augmented Naïve Bayes-based Trust Model (CAN-TM). This model leverages the correlation that may exist among QoS attributes to solve many issues in reliable...
Named Data Networking (NDN) and Software Defined Networking (SDN) are two new and highly innovative paradigms. In fact, they are used to solve the problems of current Internet architecture. As the NDN architecture is currently under development, it needs a robust routing protocol, an effective cache replacement strategy and a fast forwarding proces...
Unmanned Aerial Vehicles (UAVs) based systems are a suitable solution for monitoring, more particularly for traffic monitoring. The mobility, the low cost, and the broad view range of UAVs make them an attractive solution for traffic monitoring of city roads. UAVs are used to collect and send information about vehicles and unusual events to a traff...
Internet of Things (IoT) is an emerging networking paradigm that aims to improve human daily life. It includes a huge number of interactive nodes that generate, aggregate and exchange sensitive data. Thus, security and privacy challenges must be addressed. Various studies on privacy in the area of IoT were proposed. However, none has considered all...
he objective of health monitoring systems is toprovide sustainable and high-quality service to subscribers,hence requiring that the system run without interruption fora sufficiently long time. In this paper, we investigate lifetimemaximization in Wireless Body Sensor Networks (WBSN) toprovide sustainable e-health service with energy harvestingenabl...
Internet of Things (IoT) is increasingly deployed in different domains and environments including smart homes, smart cities, healthcare, industry 4.0, and smart agriculture, by connecting a large number of physical objects to deliver a new class of applications. The rising number of these connected objects and their heterogeneity have raised new re...
In this paper, we define a cluster based scheduling algorithm for Cognitive Radio Sensor Networks. To avoid inter-clusters collision, we assign fixed channels only to nodes having one-hop neighbors out of their clusters. We denote these nodes as specific nodes. Previous studies assign distinct channels to whole neighbor clusters to avoid inter-clus...
Human beings need a regular supply of healthy food, clean water and especially intoxicated air. However, the increase in industrialization leads to high gas emissions, which effects badly the urban environment and people health. To measure, in real time, pollutants concentrations influencing the human health and natural environment, traditional equ...
In the healthcare domain, Wireless Body Area Network (WBAN) has emerged as a vital
technology that is capable of providing better methods to diagnose various hazardous
diseases. The CANet projet is a project that proposes alternative monitoring solutions.
This paper studies the possibility of transmitting different types of information through
an I...
Unmanned Aerial Vehicles (UAVs) are becoming an attractive solution for road traffic monitoring because of their mobility, low cost, and broad view range. Up to now, existing traffic monitoring systems based on UAVs only use one UAV with fixed trajectory to extract information about vehicles. In this paper, we propose a road traffic monitoring syst...
Wireless sensor networks (WSNs) have become more and more notorious thanks to their numerous advantages. But, some of the WSN weaknesses, inherent to sensor nodes’ particularities (low memory, finite battery, etc.), make these networks vulnerable especially for some particular scenarios such as nodes’ mobility which alters the correct network funct...
Cluster-based cognitive radio sensor networks (CRSNs) are envisioned as a strong driver in smart grid (SG) network development. Added to the sensors’ capability to exploit
the temporally available licensed spectrum, a hierarchical CRSN allows a better network organization in such a harsh electrical environment. However, in CRSNs, one common contro...
eHealth applications have become essential in everyday life healthcare especially for elderly and sick individuals. To provide efficiency to such applications, many standards emerged for WBANs. However, WBANs standards showed their limits in terms of QoS and priorities differentiation depending on applications need. In this paper, we investigate IE...
The Information Centric Networking (ICN) approach proposes to rebuild the Internet communication model and to focus entirely on the data content. Although the Named Data Networking (NDN) architecture is considered as one of the most credible ICN architectures, it does not have an effective cache replacement system. Software Defined Networking (SDN)...
E-health represents an attractive application for the Internet of Things. It improves the quality of medical services by allowing periodic patient diagnostics. As it collects and sends sensitive biomedical information, both content and contextual privacy requirements must be satisfied. Content privacy ensures the protection of patient information a...
The Wireless sensor networks (WSNs) become more and more recognized these recent years and their applications spread in several domains. In general, these applications require that the network presents a minimum degree of reliability, effectiveness and robustness. However, the specificity of the nodes used in this type of networks makes them prone...