Lyes Khelladi

Lyes Khelladi
Research Center on Scientific and Technical Information | CERIST · Division Théorie et Ingénierie des Systèmes Informatiques (DTISI)

PhD

About

14
Publications
10,061
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
770
Citations
Additional affiliations
January 2002 - present
Research Center on Scientific and Technical Information
Position
  • Permanent Researcher

Publications

Publications (14)
Article
Full-text available
In this paper, we propose the use of a prediction approach for real-time tracking in VSNs. Our solution anticipates the target’s future direction and concentrates the tracking process in specific zones to enhance the tracking precision. Furthermore, it optimizes the network load by concentrating tracking data in the predicted zones and thereby ligh...
Article
Full-text available
This paper deals with wireless charging in sensor networks and explores efficient policies to perform simultaneous multi-node power transfer through a mobile charger (MC).The proposed solution, called On-demand Multi-node Charging (OMC), features an original threshold-based tour launching (TTL) strategy, using request grouping, and a path planning...
Conference Paper
Full-text available
This paper deals with simultaneous energy transfer to multiple nodes for scalable wireless recharging in wireless sensor networks. All existing recharging schemes rely on the use of a mobile charger that roves the network and drops by some locations for nodes recharging. However, they focus on the efficiency of energy transfer and neglect the energ...
Article
Full-text available
Vehicular traffic is increasing around the world, especially in urban areas. This increase results in a huge traffic congestion, which has dramatic consequences on economy, human health, and environment. Traditional methods used for traffic management, surveillance and control become inefficient in terms of performance, cost, maintenance, and suppo...
Article
Full-text available
In this chapter, we provide a comprehensive survey of security issues in wireless sensor networks. We show that the main features of WSNs, namely their limited resources, wireless communications, and close physical coupling with environment, are the main causes of the their security vulnerabilities. We discuss the main attacks stemming from these v...
Conference Paper
The focus of this paper is on vehicular traffic safety in which we suggest a wireless sensor network (WSN) based solution that allows vehicles with merely onboard sensors to avoid frontal collisions in rural highways. The unique feature of our solution is the infrastructureless, i.e. no infrastructure is required but only tiny low-cost sensors are...
Article
Full-text available
Ensuring security in embedded systems translates into several design challenges, imposed by the unique features of these systems. These features make the integration of conventional security mechanisms impractical, and require a better understanding of the whole security problem. This paper provides a unified view on security in embedded systems, b...
Conference Paper
Full-text available
Directed diffusion is a prominent example of data-centric routing in sensor networks, since it is based on application layer data and purely local interactions. However, its functioning relies heavily on expensive operations, like network-wide flooding, that may decrease the protocol performance in densely deployed networks. In this paper, we take...
Article
Full-text available
Security in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability of wireless links, the limited physical protection of nodes, the dynamically changing topology, the absence of a certification authority, and the lack of a centralized monitoring or management point. Earlier studies on mobile ad hoc networks (MANETs) ai...

Questions

Question (1)
Question
if a sender is transmitting with energy E1 , any receiver within the communication range will receive an energy E2 <E1 (E2 depends on the distance between the sender and the receiver). However , if we have n receivers within the communication range ,the total amount of received energy will be E2+E3+.......En+1. and this sum maybe higher than E1. how could we have an energy higher than the one transmitted initially ? am i missing something?   

Network

Cited By