Mohamed Mosbah

Mohamed Mosbah
Institut Polytechnique de Bordeaux · ENSEIRB-MATMECA

Professor Computer Science

About

284
Publications
31,077
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,022
Citations
Introduction
Mohamed Mosbah is a Professor of in computer science at Polytechnic Institute of Bordeaux (Bordeaux INP) since 2005. He is currently Vice-President of the institute in charge of Digital Transformations. He carries his research in LaBRI, a research Lab. in computer science common with the University of Bordeaux and CNRS, where he had been the Deputy Director. His research areas include distributed systems and algorithms, security, vehicular networks. He has directed around 30 PhD dissertations.
Additional affiliations
January 2005 - present
Institut Polytechnique de Bordeaux
Position
  • Professor in computer science
January 1994 - December 2004
École Nationale Supérieure d´Électronique et de Radioélectricité de Bordeaux
Position
  • Professor (Assistant)
January 1994 - present
University of Bordeaux
Position
  • Resarcher (LaBRI)

Publications

Publications (284)
Article
Full-text available
Advances in telecommunications technology and the miniaturization of biomedical sensors have allowed the rapid and widespread adoption of wireless body area networks (WBANs) to provide affordable, innovative, patient-centric e-health solutions to the growing elderly population in developed countries. However, WBANs confront a variety of challenges...
Conference Paper
Enhancing the functionality of connected and automated vehicles (CAVs) hinges on the robust exchange of real-time safety messages. These communications are critical for conveying traffic information, aiding drivers in accident prevention. Ensuring the prompt and dependable transmission of such messages is vital, necessitating effective channel acce...
Preprint
Full-text available
Cooperative intelligent transport systems rely on a set of Vehicle-to-Everything (V2X) applications to enhance road safety. Emerging new V2X applications like Advanced Driver Assistance Systems (ADASs) and Connected Autonomous Driving (CAD) applications depend on a significant amount of shared data and require high reliability, low end-to-end (E2E)...
Article
Full-text available
The Intelligent Transportation System protocol stack has revolutionized traffic efficiency and road safety applications in vehicular environments. This is due to the incorporation of the 802.11p standard in the 5.9 GHz band. This study introduces a novel architecture for vehicular communications. It employs Internet Protocol version 4 multicast ove...
Article
Full-text available
Defect detection on rail lines is essential for ensuring safe and efficient transportation. Current image analysis methods with deep neural networks (DNNs) for defect detection often focus on the defects themselves while ignoring the related context. In this work, we propose a fusion model that combines both a targeted defect search and a context a...
Conference Paper
The Internet of Vehicles (IoV) relies heavily on Vehicle-to-Everything (V2X) communications to enhance traffic safety and reduce the risk of accidents. This is particularly critical in level crossing scenarios where rail communications rely on their own infrastructure with unique access technology and message types. Solutions for safer level crossi...
Article
The effects of transport development on people’s lives are diverse, ranging from economy to tourism, health care, etc. Great progress has been made in this area, which has led to the emergence of the Internet of Vehicles (IoV) concept. The main objective of this concept is to offer a safer and more comfortable travel experience through making avail...
Chapter
Intelligent Systems for IoE Based Smart Cities provides simplified information about complexities of cyber physical systems, the Internet of Everything (IoE) and smart city infrastructure. It presents 11 edited chapters that reveal how intelligent systems and IoE are driving the evolution of smart cities, making them more efficient, interconnected,...
Article
Emerging V2X applications, like Advanced Driver Assistance Systems (ADASs) and Connected Autonomous Driving (CAD) require Ultra-Reliable Low Latency Communications (URLLC). Unfortunately, none of the existing V2X communication technologies, such as ETSI ITS-G5 or C-V2X (Cellular V2X including 5G NR), can satisfy these requirements independently. In...
Preprint
Full-text available
p> The increase in popularity of wireless networks in industrial, embedded, medical and public sectors has made them an appealing attack surface for attackers who exploit the vulnerabilities in network protocols to launch attacks such as Evil Twin, Man-in-the-middle, sniffing, etc ., which may result in economic and non-economic losses. To protect...
Preprint
Full-text available
The Intelligent Transportation System protocol stack (ITS-G5/802.11p) has revolutionized traffic efficiency and road safety applications in vehicular environments. This study presents a novel architecture for communications, utilizing IPv4 mul-ticast over 802.11p/ETSI ITS-G5, which addresses the challenges of a specific urban use case involving a L...
Preprint
Full-text available
p> The increase in popularity of wireless networks in industrial, embedded, medical and public sectors has made them an appealing attack surface for attackers who exploit the vulnerabilities in network protocols to launch attacks such as Evil Twin, Man-in-the-middle, sniffing, etc ., which may result in economic and non-economic losses. To protect...
Chapter
In this paper, we present a method that supports multi-server learning with distributed data, by collecting selected data from the neighbors of training servers, the proposed training scheme can train multiple models on multiple servers located at specific points. By collecting selected data from the neighbors of the training servers, the proposed...
Article
Full-text available
The increase in popularity of wireless networks in industrial, embedded, medical and public sectors has made them an appealing attack surface for attackers who exploit the vulnerabilities in network protocols to launch attacks such as Evil Twin, Man-in-the-middle, sniffing, etc., which may result in economic and non-economic losses. To protect wire...
Article
V2I communications complement V2V safety applications by dealing with emergency situations such as crash scenarios that the V2V program cannot handle or that could be addressed more effectively. However, depending on the deployed infrastructure, we can distinguish between three situations regarding allowed communications: infrastructure-based, infr...
Preprint
Full-text available
p>In this manuscript, we analyze the security offered by existing 802.11 protocols against one of the most basic yet detrimental Evil Twin (ET) attacks. To comprehensively protect Wi-Fi networks against such attacks, vulnerabilities in the IEEE 802.11 specifications were addressed by new and improved security mechanisms. Unfortunately, each of the...
Preprint
Full-text available
p>In this manuscript, we analyze the security offered by existing 802.11 protocols against one of the most basic yet detrimental Evil Twin (ET) attacks. To comprehensively protect Wi-Fi networks against such attacks, vulnerabilities in the IEEE 802.11 specifications were addressed by new and improved security mechanisms. Unfortunately, each of the...
Chapter
A distributed system is a set of logical or physical units capable of performing calculations and communicating with each other. Nowadays, these systems are at the heart of technologies such as the Internet of Things IoT, the Internet of Vehicles IoV, etc. These systems collect data, perform calculations and make decisions. On the other hand, deep...
Article
Purpose Nowadays, connected vehicles are becoming quite complex systems which are made up of different devices. In such a vehicle, there are several electronic control units (ECUs) that represent basic units of computation. These ECUs communicate with each other over the Controller Area Network (CAN) bus protocol which ensures a high communication...
Article
Ensuring that an active path is provided at all times in a Wireless Sensor Network (WSN) is fundamental for securing the timely delivery of critical data and maintaining the quality of service required to effectively support delay-sensitive applications. In duty cycling mode, ensuring such a path becomes a real challenge as the activity scheduling...
Conference Paper
Cooperative Intelligent Transport Systems (C-ITS) are becoming indispensable in improving road safety and traffic management. ITS-G5 is the European standard for vehicle to everything (V2X) communications. With advanced V2X applications and use cases, the need for enhanced communication performance and broader perception of the road becomes crucial...
Conference Paper
With the widespread usage of Internet-enabled devices, the Internet of things (IoT) has become popular and well integrated in different countries nowadays. However, the huge amount of data generated from several smart devices in the same IoT network, security of the network and the limited devices capacities of storage and process are a very big co...
Article
With the advent of Internet of Vehicles, overhead related to localization services and path discovery step can drain the network resources and overload the large-scale vehicular networks, thus slowing down the routing process, especially with the recent surge of time-sensitive and QoS (Quality of Service) greedy applications. Performing proactively...
Chapter
After the deployment of a Wireless Sensor Network (WSN), we may need to update or even change the algorithm running in the sensors. WSNs are often deployed on a large scale which makes the manual update of the running algorithms impractical. Moreover, for some WSNs, sensors are physically inaccessible like sensors deployed in harsh environments mak...
Chapter
In recent years, cities are experiencing a deep negative impact due to traffic congestion. As the number of vehicles is increasing rapidly, traffic congestion becomes unsustainable in urban domains specially in peak hours leading to time and fuel waste, accidents, additional costs for the economy, environmental problems and consequently impaired qu...
Chapter
Due to the huge number of accidents, improving driving safety around the world is becoming a priority. Providing efficient and cost effective solutions to detect driving behavior is quite a challenging research topic worldwide. Exploring several technologies including big data, machine learning, data mining and data analysis in general can help res...
Chapter
Smart City is a new concept that relies on digital technologies in order to interact more effectively with its citizens, create new business opportunities and reduce operational costs and resource consumption, while respecting environmental factors and sustainability objectives. Transport of goods and people is at the heart of Smart City activities...
Chapter
As the interest to improve road safety and traffic management is growing, a new generation standard for Vehicular Ad-hoc Networks (VANETs) need to be defined to enhance the performances of the vehicular networks’ communications, in terms of reliability, latency, and throughput. Nowadays, the IEEE 802.11p related systems such as ITS-G5, are the most...
Chapter
Broadcasting urgent information is emerging as an important area of research. One of the issues posed by this subject is the delivery ratio and the transmission time that depend on several factors such as the mobility of persons, the battery of their mobile devices, etc. In this paper, we are interested in broadcasting emergency messages to inform...
Article
Wireless sensor networks (WSNs) are composed of sensors exchanging the information that they collect from the environment. The use of a scheduler offers an efficient solution to eliminate information redundancy and possible collisions in this network. A scheduler is responsible for choosing the sensors to exchange information at each step of the al...
Article
Due to the increasing number of vehicles in circulation in different urban cities, several automatic traffic monitoring systems have been developed. In particular, traffic monitoring systems using roadside cameras are becoming extensively deployed, as they offer imperative technological advantages compared with other traffic monitoring systems. Veh...
Article
Multimedia transport over Wireless Sensor Networks (WSN) has been a challenging task due to the limited available resources of such networks. the capability of Multipath routing to balance and distribute the load of a given flow on different disjoint non correlated paths is a viable solution to ensure the required high throughput. Moreover, operati...
Article
The specific characteristics of vehicular ad-hoc networks, such as high-speed of nodes and frequent topology changes, impose challenges for the routing process. In addition, the advent of the Internet of Vehicles concept along with the autonomous and connected cars contribute to the proliferation of new innovative applications with different qualit...
Article
As sensor nodes are power constrained, saving energy and prolonging network lifetime have been given the greatest priority in the design of routing protocols in wireless sensor networks (WSNs). In this regard, duty‐cycling is broadly utilized as an underlying MAC (Medium Access Control)‐based protocol for routing solutions. In this regard, a cross‐...
Article
Full-text available
This paper presents a systematic literature review of platooning systems with a special focus on the strategies which have been adopted to validate platooning algorithms. We collect the existing studies in the platooning field. The proposed algorithms are compared based on some criteria including platooning operations, communication modes, and vali...
Chapter
Since its launch in 2007, Google's open source mobile operating system Android has become the most prominent OS for smartphones. Availability of 3 million Android apps on official repository, Google Play Store, and a not too tightly controlled environment for app developers have added to the popularity of Android and growth of Android devices. This...
Conference Paper
Cut-in into vehicle platoons is a dangerous driving maneuver that affects the safety and efficiency of platooning vehicles. An accurate prediction of such maneuver enable the platooning system to take safety measures to ensure the platoon safety and integrity. The contribution of this paper consists of an evaluation of a set of supervised machine l...
Article
Achieving network resiliency in terms of availability, reliability and fault tolerance is a central concern for network designers and operators to achieve business continuity and increase productivity. It is particularly challenging in increasingly virtualized network environments where network services are exposed to both hardware (e.g., bare-meta...
Chapter
Software Defined Networking (SDN) is an emerging technology that introduces a new design for networking. It decouples the hardware and the software for simplifying and hiding the management part of network elements. This technology has also an interesting impact for network security since it affords automation, convergence, etc. We can benefit from...
Article
Proving the correctness of distributed algorithms is a difficult challenge in dynamic networks. In these networks, topological changes can take place due to unexpected appearance and disappearance of devices and communication links. The existing studies in the literature lack a general model for their development and their proof. Besides, most of t...
Chapter
Vehicle detection plays a significant role in traffic monitoring. Vehicle detection approaches can be used for vehicle tracking, vehicle classification and traffic analysis. However, numerous attributes like shape, intensity, size, pose, illumination, shadows, occlusion, velocity of vehicles and environmental conditions, provide different challenge...
Chapter
A Wireless Sensor Network (WSN) is composed of sensors that communicate together in a distributed way to supervise the environment. The energy consumption is an important performance measure for a WSN that spurs the development of energy-efficient distributed algorithms for WSNs. In this field, we focus on a specific type of distributed algorithms...
Book
This book contains extended versions of the best papers presented at the First International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2019, held in Hammamet, Tunisia, in October 2019. The 9 revised full papers included in this volume were carefully reviewed and selected from 24 initial submissions. The papers are orga...
Chapter
As the energy efficiency remains a key issue in wireless sensor networks, duty-cycled mechanisms acquired much interest due to their ability to reduce energy consumption by allowing sensor nodes to switch to the sleeping state whenever possible. The challenging task is to authorize a sensor node to adopt a duty-cycle mode without inflicting any neg...
Article
Full-text available
Broadcasting emergency messages has been widely recognized as an important area of research. A crucial issue, in this context, is to ensure the correctness of broadcasting protocols using a formal method to prevent errors before their implementation. In this paper, we propose a new protocol for broadcasting emergency messages in order to inform per...
Chapter
In recent years, cities are experiencing a deep negative impact due to traffic congestion. As the number of vehicles is increasing rapidly, traffic congestion becomes unsustainable in urban domains specially in peak hours leading to time and fuel waste, accidents, additional costs for the economy, environmental problems and consequently impaired qu...
Book
This book constitutes the refereed proceedings of the Second International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2020, held in Bizerte, Tunisia, in December 2020. Due to the COVID-19 pandemic the conference was held online. The 8 full papers included in this volume were carefully reviewed and selected from numerou...
Chapter
The specific characteristics of vehicular ad-hoc networks, such as high-speed nodes, frequent topology changes and predefined vehicle movement paths, make mobile ad-hoc networks routing protocols not convenient to disseminate data in the vehicular environment. In addition, the new vision towards Internet of Vehicles concept along with the advent of...
Chapter
Wireless Body Area Networks (WBANs), designed especially for healthcare applications require a strict guarantee of quality of service (QoS), in terms of latency, error rate and reliability. Generally, medical applications have different kinds of data traffic which may be classified into periodic, urgent or on-demand. Each type has its own requireme...
Chapter
The number of connected Things is growing at a frantic pace, which has led to vertical, proprietary Internet of Things (IoT) solutions. To ensure a horizontal IoT cross-industry interoperability, eight of the word’s leading ICT standards bodies introduce the oneM2M standard. Its main goal is to satisfy the need for a common M2M Service Layer that g...
Article
Full-text available
Constructing maximal cliques is a well-known problem in the graph theory. Despite this problem has been well studied for decades, few efforts have been presented in distributed computing. The main contribution of this paper is to propose a distributed algorithm, modeled by local computations, for constructing all maximal and disjoint cliques in a s...
Chapter
An app named “Aqua Mail” is a Google play store app with millions of downloads. It allows the user to manage Google account mails. For caching purposes, it stores the mails in a content provider protected with a custom permission rather than Android defined permission to access mails (MANAGE_ACCOUNTS). Another app named “Enhanced SMS and call” can...
Conference Paper
Full-text available
Nowadays, Wireless Body Area Networks (WBANs) are revolutionizing the field of healthcare applications which is deeply related to human life and requires a noteworthy attention. In this medical context, reliability, energy consumption and real time monitoring are the main Quality of Service (QoS) challenges to satisfy. This kind of networks relies...
Preprint
In this paper, we demonstrate a realistic variant of wireless Evil Twins (ETs) for launching device to device (D2D) attacks over the network, particularly for Android. We show an attack where an ET infects an Android device before the relay of network traffic through it, and disappears from the network immediately after inflicting the device. The a...
Article
In this paper, we demonstrate a realistic variant of wireless Evil Twins (ETs) for launching device to device (D2D) attacks over the network, particularly for Android. We show an attack where an ET infects an Android device before the relay of network traffic through it, and disappears from the network immediately after inflicting the device. The a...
Article
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn cyberattack exposed the critical fault-lines among smart networks. Security of Internet of Things (IoT) has become a critical concern. The danger exposed by infested Internet-connected things not only affects the security of IoT, but also threatens the complete I...
Book
This book constitutes the refereed proceedings of the 16th International Colloquium on Theoretical Aspects of Computing, ICTAC 2019, held in Hammamet, Tunisia, in October/November 2019. The 17 revised full papers presented together with 2 keynote papers and 1 industrial paper were carefully reviewed and selected from 138 submissions. The papers are...