Lyes Khoukhi

Lyes Khoukhi
  • Full Professor of Cybersecurity
  • ENSICAEN, Normandie university

About

217
Publications
107,267
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,612
Citations
Current institution
ENSICAEN, Normandie university

Publications

Publications (217)
Article
This paper proposes a novel framework integrating Rate Splitting Multiple Access (RSMA), semantic communications , and generative AI for optimizing next-generation wireless networks. We present a unified model that combines RSMA with semantic communications to enhance both spectral efficiency and semantic fidelity. A dynamic contract-based incentiv...
Article
Full-text available
In today’s rapidly evolving cyber landscape, the growing sophistication of attacks, including the rise of zero-day exploits, poses critical challenges for network intrusion detection. Traditional Intrusion Detection Systems (IDSs) often struggle with the complexity and high dimensionality of modern cyber threats. Quantum Machine Learning (QML) seam...
Article
The advent of the QUIC protocol may herald a significant shift in the composition of online traffic in the years to come. The transport layer encryption of the QUIC protocol is one of its main evolutions, especially for metadata that was previously transmitted over TCP traffic without encryption. This new protocol has the potential to require signi...
Article
Full-text available
Mobile Edge Computing (MEC) has been proposed to enhance the performance of Internet of Things (IoTs) devices by offloading computation-intensive tasks to nearby edge clouds, while Non-Orthogonal Multiple Access (NOMA) enables multiple IoTs devices to share subcarriers with varying power levels, making it ideal for computation offloading. Despite t...
Article
Full-text available
Over the past few decades, Intelligent Transportation System (ITS) has become a vital and extensive element of daily human life and activity. Vehicular Ad hoc Networks (VANETs) have become the most promising components of ITS, which promises to enhance transport efficiency, passenger safety, and comfort by exchanging traffic and infotainment inform...
Article
Internet of Things (IoT) is a promising paradigm that is considered as major enabler of smart cities. However, with the emergence of IoT botnets, the number of unsecured IoT devices is increasing rapidly. This can give attackers more advanced tools to carry out large scale damaging IoT attacks. Advanced Machine Learning (ML) techniques can help enh...
Article
Full-text available
To meet the target of carbon neutrality by the year 2050 and decrease the dependence on fossil fuels, renewable energy sources (RESs), specifically wind power, and Electric Vehicles (EVs) have to be massively deployed. Nevertheless, the integration of a large amount of wind power, with an intermittent nature, into the grid and the variability of th...
Article
Distributed denial-of-service (DDoS) attacks continue to grow at a rapid rate plaguing Internet Service Providers (ISPs) and individuals in a stealthy way. Thus, intrusion detection systems (IDSs) must evolve to cope with these increasingly sophisticated and challenging security threats. Traditional IDSs are prone to zero-day attacks since they are...
Article
The implication of cyber-physical systems into industrial processes has introduced some security breaches due to the lack of security mechanisms. This article aims to come up with a novel methodology to detect false data injection attacks on cyber-physical systems. To reach this goal, we propose an efficient anomaly-based approach for detecting fal...
Article
Vehicular communication is one of the essential technologies for increasing road safety, traffic efficiency, and comfort for pedestrians and drivers. In this context, the internet of vehicles is an emerging paradigm. However, with advances in vehicular communication, security threats have also emerged. Several vulnerabilities exist in vehicular com...
Article
Data-driven Machine and Deep Learning (ML/DL) is an emerging approach that uses medical data to build robust and accurate ML/DL models that can improve clinical decisions in some critical tasks (e.g., cancer diagnosis). However, ML/DLbased healthcare models still suffer from poor adoption due to the lack of realistic and recent medical data. The pr...
Conference Paper
Vehicle Ad-hoc Network (VANET) is the main component of the intelligent transportation system. With the development of the next generation intelligent vehicular networks, the latter aims to provide strategic and secure services and communications in roads and smart cities. Due to VANET’s unique characteristics, such as high mobility of its nodes, s...
Article
Full-text available
A vehicle ad‐hoc network (VANET) is an essential component of the intelligent transportation system. In VANET, vehicle‐to‐vehicle communication plays a significant role in providing a secure network and safe exchange of information between nodes. However, VANET is prone to critical risks, threats, and attacks due to its unique characteristics and d...
Article
Full-text available
Recently, with the different issues encountered in road mobility, the presence and development of the Vehicular Ad hoc Networks (VANETs) have become a necessity. VANETs have various positive impacts on vehicular safety, road security, traffic management, drivers' comfort, and passengers' convenience. However, the expansion in the world's population...
Article
Full-text available
When cybersecurity is neglected, any network system loses its efficiency, reliability, and resilience. With the huge integration of the Information, Communication, and Technology capabilities, the Connected Electric Vehicle (CEV) as a transportation form in cities is becoming more and more efficient and able to reply to citizen and environmental ex...
Article
Full-text available
False data injection (FDI) attacks aim to threaten the security of Internet of Things (IoT) systems by falsifying a device's measurements without being detected. In this paper, we propose a process for detecting and predicting FDI attacks, which aims to predict future attacks before they occur and induce IoT devices to behave reliably. First, we pr...
Article
Industry 5.0 is rapidly growing as the next industrial evolution, aiming to improve production efficiency in the 21 century. This evolution relies mainly on advanced digital technologies, including Industrial Internet of Things (IIoT), by deploying multiple IIoT devices within industrial systems. Such a setup increases the possibility of threats, e...
Article
Mobile edge computing (MEC) is an emerging paradigm that provides radio access net- works with augmented resources to meet the requirements of Internet of Things (IoT) services. MEC allows IoT devices to offload delay sensitive and computation intensive tasks to edge clouds deployed at base stations (BSs). Offloading tasks to edge clouds can allev...
Preprint
Full-text available
The blockchain is a distributed technology which allows establishing trust among unreliable users who interact and perform transactions with each other. While blockchain technology has been mainly used for crypto-currency, it has emerged as an enabling technology for establishing trust in the realm of the Internet of Things (IoT). Nevertheless, a n...
Preprint
Full-text available
Security in the fifth generation (5G) networks has become one of the prime concerns in the telecommunication industry. 5G security challenges come from the fact that 5G networks involve different stakeholders using different security requirements and measures. Deficiencies in security management between these stakeholders can lead to security attac...
Preprint
Full-text available
Recently, blockchain has gained momentum as a novel technology that gives rise to a plethora of new decentralized applications (e.g., Internet of Things (IoT)). However, its integration with the IoT is still facing several problems (e.g., scalability, flexibility). Provisioning resources to enable a large number of connected IoT devices implies hav...
Preprint
Full-text available
The 5G wireless networks are potentially revolutionizing future technologies. The 5G technologies are expected to foresee demands of diverse vertical applications with diverse requirements including high traffic volume, massive connectivity, high quality of service, and low latency. To fulfill such requirements in 5G and beyond, new emerging techno...
Preprint
Full-text available
Federated learning (FL) is a distributed machine learning (ML) technique that enables collaborative training in which devices perform learning using a local dataset while preserving their privacy. This technique ensures privacy, communication efficiency, and resource conservation. Despite these advantages, FL still suffers from several challenges r...
Chapter
In recent years, there has been a huge increase in the number of attacks that cause huge damage and financial losses for both educational and business organizations. Intrusion detection systems (IDSs) play a key role in ensuring network security. With the emergence of new types of security threats, traditional IDSs based on pattern matching and sig...
Chapter
Full-text available
The 5G wireless networks are potentially revolutionizing future technologies. The 5G technologies are expected to foresee demands of diverse vertical applications with diverse requirements including high traffic volume, massive connectivity, high quality of service, and low latency. To fulfill such requirements in 5G and beyond, new emerging techno...
Article
Full-text available
Internet of Things (IoT) is an emerging paradigm that is turning and revolutionizing worldwide cities into smart cities. However, this emergence is accompanied with several cybersecurity concerns due mainly to the data sharing and constant connectivity of IoT networks. To address this problem, multiple Intrusion Detection Systems (IDSs) have been d...
Article
Full-text available
Energy efficiency (EE) is of great concern in cognitive radio networks since the throughput and energy consumption of secondary users (SUs) vary with the sensing time. However, the conditions of the detection probability and false alarm probability should be respected to better protect primary users (PUs) and to improve the sensing performance of S...
Conference Paper
In the recent decades, Intelligent Transport Systems (ITS) attracted researchers’ great attention. ITS plays a very important role in making citizens’ lives easier in term of mobility, safety, quality of life and security. Vehicular ad-hoc networks (VANETs) became an inseparable component of ITS. The current architecture has been facing many issues...
Conference Paper
Recently, software defined networks (SDN) has emerged as novel technology that leverages network programmability to facilitate network management. SDN provides a global view of the network, through a logically centralized component, called SDN controller, to strengthen network security. SDN separates the control plane from the data plane, which all...
Article
In a time where data traffic is booming, Software-defined Networking (SDN) is becoming the most plausible solution to cope with the conventional networks shortcomings. The separation of the control (software) and the data (hardware) planes makes of SDN a technology-enabled to a multitude of new and promising applications and use cases for 5G networ...
Conference Paper
Full-text available
Recently, blockchain has gained momentum as anovel technology that gives rise to a plethora of new decen-tralized applications (e.g., Internet of Things (IoT)). However,its integration with the IoT is still facing several problems(e.g., scalability, flexibility). Provisioning resources to enable alarge number of connected IoT devices implies having...
Article
Full-text available
Vehicular communication is recently considered as one of the key future technology to improve the safety of vehicles, the efficiency of traffic and the comfort for both drivers and pedestrians. Vehicular communications, based on IEEE 802.11p, use the Enhanced Distributed Channel Access (EDCA) algorithm to support different levels of Quality of Serv...
Chapter
In recent years, Data Centers are considered as the backbone of the Cloud Computing systems and are meant to deliver large-scale cloud-based services. The Transmission Control Protocol (TCP) is the most used one in DCNs wherein congestion occurs when multiple senders send data to one receiver at the same time, this phenomenon is the TCP incast. In...
Article
In vehicular ad hoc network (VANET), lots of information should be delivered on a large scale in a limited time. Meanwhile, vehicles are quite dynamic with high velocities, which causes a large number of vehicle disconnections. Both of these characteristics lead to unreliable information transmission in VANET. A vehicle clustering algorithm, which...
Conference Paper
The emergence of Internet of Energy (IoE) paves the way for sustainable and green energy environments that reduce energy costs and integrate Renewable Energy Sources (RESs) as new sources of energy. Electric vehicles (EVs) are one of the main actors of IoE future. The emergence of EVs promises to reduce the environmental crisis (e.g., carbon emissi...
Article
Full-text available
The vehicular communication hasbeen considered as the most promising wirelesscommunication technology in the computernetwork scenario, the beginning of which hasmarked a great change for the passengers in therange of safety application. The development ofvehicular communication increased securitythreats and weaknesses. Vehicularcommunication is exp...
Article
Full-text available
Security in fifth generation (5G) networks has become one of the prime concerns in the telecommunication industry. 5G security challenges come from the fact that 5G networks involve different stakeholders using different security requirements and measures. Deficiencies in security management between these stakeholders can lead to security attacks....
Article
The enabling technology of vehicular networks for Intelligent Transportation Systems (ITS), smart cities and autonomous driving, offers promising on-board services such as road-safety, easy navigation, comfort driving and infotainment. These services can co-exist simultaneously in the system. One challenging issue is to provide the different qualit...
Article
As one of the most devastating types of Distributed Denial of Service (DDoS) attacks, Domain Name System (DNS) amplification attack represents a big threat and one of the main Internet security problems to nowadays networks. Many protocols that form the Internet infrastructure expose a set of vulnerabilities that can be exploited by attackers to ca...
Article
Full-text available
In numerous Internet of Things (IoT) scenarios (such as Intelligent Transportation System (ITS) or environment sensing), the ad hoc mode is widely used. Ad-hoc networks have several benefits including infrastructureless and spontaneous deployment, and the opportunity to set up temporary and dynamic networks cost-effectively. However, some of their...
Conference Paper
Nowadays, blockchain technology is seen as one of the main technological innovations to emerge since the advent of the internet. Many applications can benefit from blockchain to protect their exchanges. Nonetheless, applications with more restricted interests cannot use public blockchains. Permissioned blockchains promise to combine effectiveness o...
Conference Paper
Smart grids (SGs) and advanced metering infrastructures (AMIs) are considered as the new evolution of classical electrical grids. The recent emergence of smart meters is paving the way for the proliferation of smart grids, where billions of smart meters are interconnected to provide novel pervasive services (e.g., real time pricing application and...
Article
Electric vehicles (EVs) are likely to become very popular within the next few years. With possibly millions of such vehicles operating across smart cities, the charging of EVs batteries can directly impact smart grid energy providers. In order to reduce this impact and optimize energy saving, in this paper, we propose a coordinated model for schedu...
Article
Full-text available
With the exponential growth in the number of insecure devices, the impact of Distributed Denial-of-Service (DDoS) attacks is growing rapidly. Existing DDoS mitigation schemes are facing obstacles due to low flexibility, lack of resources and high cost. The new emerging technologies, such as blockchain, introduce new opportunities for low-cost, effi...
Article
5G networks are anticipated to support a plethora of innovative and promising network services. These services have heterogeneous performance requirements (e.g., high-rate traffic, low latency and high reliability). To meet them, 5G networks are entailed to endorse flexibility that can be fulfilled through the deployment of new emerging technologie...
Article
The opportunistic utilization of access devices to offload mobile data from cellular network has been considered as a promising approach to cope with the explosive growth of cellular traffic. To foster this opportunistic utilization, we consider a mobile data offloading market where mobile network operator (MNO) can sell bandwidth made available by...
Article
Full-text available
Given the shortcomings of traditional networks, Software-Defined Networking (SDN) is considered as the best solution to deal with the constant growth of mobile data traffic. SDN separates the data plane from the control plane, enabling network scalability and programmability. Initial SDN deployments promoted a centralized architecture with a single...
Article
Full-text available
A large scale of spectrum sensing techniques are proposed to improve the use of spectrum resources. However, the EE (energy efficiency) should be guaranteed for both primary and secondary users, especially under various detection performance constraints. In this regard, the linking between activities of PU (primary user) and dynamic access behavior...
Article
Full-text available
Wireless mesh networks (WMNs) have become an increasingly popular wireless networking technology for establishing the last-mile connectivity for home and neighbourhood networkings. In such networks, packet dropping may be due to either an attack, or normal loss events such as bad channel quality. Furthermore, in the route discovery phase, path stab...
Conference Paper
Nowadays, blockchain is seen as one of the main technological innovations. Many applications can rely on the blockchain to secure their exchanges. However, applications with private interest cannot rely on public blockchains. First, in a public blockchain, anyone can read the whole data of the blockchain. Second, anyone can participate to the "cons...
Conference Paper
In order to optimally schedule electric vehicles (EVs) energy charging and discharging demands, we propose in this paper a multi-level fog (MLF) model architecture. EVs energy demands in MLF are planned as charging and discharging calendars to handle with EVs energy demands in smart grid environment. Our work integrates a priority queuing model bas...
Article
Several novel and promising wireless vehicular-network applications have been developed recently. Examples include trip planning, media sharing, and Internet access. However, sufficient network resources [e.g., equipped vehicles, base stations (BSs), roadside units (RSUs), and other infrastructure] to support these applications are not yet availabl...
Article
The Wireless Access for Vehicular Environment (WAVE) mandates that data packets of non-safety applications are to be sent within WAVE basic service sets (WBSS). These WBSS are to be established on the least congested service channels. WAVE proposes a mechanism to select such channels; yet, owing to vehicles’ high mobility, there is high chance of h...
Article
Packet delivery delay minimization is a critical issue in Wireless Sensor Networks. In mission-critical applications, the sensed information is highly delay-sensitive, and should be transmitted to the sink within a required delay. In this paper, we propose a new mixed integer linear programming model (MILP) to address the problem of end-to-end dela...
Conference Paper
Full-text available
Given the shortcomings of traditional networks, Software-Defined Networking (SDN) is considered as the best solution to deal with the constant growth of mobile data traffic. SDN separates the data plane from the control plane, enabling network scalability and programmability. Initial SDN deployments promoted a centralized architecture with a single...
Article
Industry 4.0 or Industrial Internet of Things (IIoT), has become one of the most talked-about industrial business concepts in recent years. Thus, to efficiently integrate Internet of Things (IoT) technology into industry, the collected and sensed data from IIoT need to be scheduled in real time constraints; especially for big factories. To this end...
Article
Cellular network is facing severe traffic overload problem caused by phenomenal growth of mobile data. Offloading part of the mobile data traffic from cellular network to alternative networks is a promising solution. In this paper, we study mobile data offloading problem under the architecture of mobile cloud computing (MCC), where mobile data can...
Conference Paper
Full-text available
In order to gather the full profits of Internet of Things (IoT) technologies, it will be necessary to provide efficient networking and computing infrastructure to support low latency and fast response for IoT applications. In this paper, we introduce a new fog architecture for IoT applications. We propose to deploy servers at the network fog level...

Network

Cited By