
Mohamed MosbahInstitut Polytechnique de Bordeaux · ENSEIRB-MATMECA
Mohamed Mosbah
Professor Computer Science
About
284
Publications
31,077
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,022
Citations
Introduction
Mohamed Mosbah is a Professor of in computer science at Polytechnic Institute of Bordeaux (Bordeaux INP) since 2005. He is currently Vice-President of the institute in charge of Digital Transformations. He carries his research in LaBRI, a research Lab. in computer science common with the University of Bordeaux and CNRS, where he had been the Deputy Director. His research areas include distributed systems and algorithms, security, vehicular networks. He has directed around 30 PhD dissertations.
Publications
Publications (284)
Advances in telecommunications technology and the miniaturization of biomedical sensors have allowed the rapid and widespread adoption of wireless body area networks (WBANs) to provide affordable, innovative, patient-centric e-health solutions to the growing elderly population in developed countries. However, WBANs confront a variety of challenges...
Enhancing the functionality of connected and automated vehicles (CAVs) hinges on the robust exchange of real-time safety messages. These communications are critical for conveying traffic information, aiding drivers in accident prevention. Ensuring the prompt and dependable transmission of such messages is vital, necessitating effective channel acce...
Cooperative intelligent transport systems rely on a set of Vehicle-to-Everything (V2X) applications to enhance road safety. Emerging new V2X applications like Advanced Driver Assistance Systems (ADASs) and Connected Autonomous Driving (CAD) applications depend on a significant amount of shared data and require high reliability, low end-to-end (E2E)...
The Intelligent Transportation System protocol stack has revolutionized traffic efficiency and road safety applications in vehicular environments. This is due to the incorporation of the 802.11p standard in the 5.9 GHz band. This study introduces a novel architecture for vehicular communications. It employs Internet Protocol version 4 multicast ove...
Defect detection on rail lines is essential for ensuring safe and efficient transportation. Current image analysis methods with deep neural networks (DNNs) for defect detection often focus on the defects themselves while ignoring the related context. In this work, we propose a fusion model that combines both a targeted defect search and a context a...
The Internet of Vehicles (IoV) relies heavily on Vehicle-to-Everything (V2X) communications to enhance traffic safety and reduce the risk of accidents. This is particularly critical in level crossing scenarios where rail communications rely on their own infrastructure with unique access technology and message types. Solutions for safer level crossi...
The effects of transport development on people’s lives are diverse, ranging from economy to tourism, health care, etc. Great progress has been made in this area, which has led to the emergence of the Internet of Vehicles (IoV) concept. The main objective of this concept is to offer a safer and more comfortable travel experience through making avail...
Intelligent Systems for IoE Based Smart Cities provides simplified information about complexities of cyber physical systems, the Internet of Everything (IoE) and smart city infrastructure. It presents 11 edited chapters that reveal how intelligent systems and IoE are driving the evolution of smart cities, making them more efficient, interconnected,...
Emerging V2X applications, like Advanced Driver Assistance Systems (ADASs) and Connected Autonomous Driving (CAD) require Ultra-Reliable Low Latency Communications (URLLC). Unfortunately, none of the existing V2X communication technologies, such as ETSI ITS-G5 or C-V2X (Cellular V2X including 5G NR), can satisfy these requirements independently. In...
p> The increase in popularity of wireless networks in industrial, embedded, medical and public sectors has made them an appealing attack surface for attackers who exploit the vulnerabilities in network protocols to launch attacks such as Evil Twin, Man-in-the-middle, sniffing, etc ., which may result in economic and non-economic losses. To protect...
The Intelligent Transportation System protocol stack (ITS-G5/802.11p) has revolutionized traffic efficiency and road safety applications in vehicular environments. This study presents a novel architecture for communications, utilizing IPv4 mul-ticast over 802.11p/ETSI ITS-G5, which addresses the challenges of a specific urban use case involving a L...
p> The increase in popularity of wireless networks in industrial, embedded, medical and public sectors has made them an appealing attack surface for attackers who exploit the vulnerabilities in network protocols to launch attacks such as Evil Twin, Man-in-the-middle, sniffing, etc ., which may result in economic and non-economic losses. To protect...
In this paper, we present a method that supports multi-server learning with distributed data, by collecting selected data from the neighbors of training servers, the proposed training scheme can train multiple models on multiple servers located at specific points. By collecting selected data from the neighbors of the training servers, the proposed...
The increase in popularity of wireless networks in industrial, embedded, medical and public sectors has made them an appealing attack surface for attackers who exploit the vulnerabilities in network protocols to launch attacks such as Evil Twin, Man-in-the-middle, sniffing, etc., which may result in economic and non-economic losses. To protect wire...
V2I communications complement V2V safety applications by dealing with emergency situations such as crash scenarios that the V2V program cannot handle or that could be addressed more effectively. However, depending on the deployed infrastructure, we can distinguish between three situations regarding allowed communications: infrastructure-based, infr...
p>In this manuscript, we analyze the security offered by existing 802.11 protocols against one of the most basic yet detrimental Evil Twin (ET) attacks. To comprehensively protect Wi-Fi networks against such attacks, vulnerabilities in the IEEE 802.11 specifications were addressed by new and improved security mechanisms. Unfortunately, each of the...
p>In this manuscript, we analyze the security offered by existing 802.11 protocols against one of the most basic yet detrimental Evil Twin (ET) attacks. To comprehensively protect Wi-Fi networks against such attacks, vulnerabilities in the IEEE 802.11 specifications were addressed by new and improved security mechanisms. Unfortunately, each of the...
A distributed system is a set of logical or physical units capable of performing calculations and communicating with each other. Nowadays, these systems are at the heart of technologies such as the Internet of Things IoT, the Internet of Vehicles IoV, etc. These systems collect data, perform calculations and make decisions. On the other hand, deep...
Purpose
Nowadays, connected vehicles are becoming quite complex systems which are made up of different devices. In such a vehicle, there are several electronic control units (ECUs) that represent basic units of computation. These ECUs communicate with each other over the Controller Area Network (CAN) bus protocol which ensures a high communication...
Ensuring that an active path is provided at all times in a Wireless Sensor Network (WSN) is fundamental for securing the timely delivery of critical data and maintaining the quality of service required to effectively support delay-sensitive applications. In duty cycling mode, ensuring such a path becomes a real challenge as the activity scheduling...
Cooperative Intelligent Transport Systems (C-ITS) are becoming indispensable in improving road safety and traffic management. ITS-G5 is the European standard for vehicle to everything (V2X) communications. With advanced V2X applications and use cases, the need for enhanced communication performance and broader perception of the road becomes crucial...
With the widespread usage of Internet-enabled devices, the Internet of things (IoT) has become popular and well integrated in different countries nowadays. However, the huge amount of data generated from several smart devices in the same IoT network, security of the network and the limited devices capacities of storage and process are a very big co...
With the advent of Internet of Vehicles, overhead related to localization services and path discovery step can drain the network resources and overload the large-scale vehicular networks, thus slowing down the routing process, especially with the recent surge of time-sensitive and QoS (Quality of Service) greedy applications. Performing proactively...
After the deployment of a Wireless Sensor Network (WSN), we may need to update or even change the algorithm running in the sensors. WSNs are often deployed on a large scale which makes the manual update of the running algorithms impractical. Moreover, for some WSNs, sensors are physically inaccessible like sensors deployed in harsh environments mak...
In recent years, cities are experiencing a deep negative impact due to traffic congestion. As the number of vehicles is increasing rapidly, traffic congestion becomes unsustainable in urban domains specially in peak hours leading to time and fuel waste, accidents, additional costs for the economy, environmental problems and consequently impaired qu...
Due to the huge number of accidents, improving driving safety around the world is becoming a priority. Providing efficient and cost effective solutions to detect driving behavior is quite a challenging research topic worldwide. Exploring several technologies including big data, machine learning, data mining and data analysis in general can help res...
Smart City is a new concept that relies on digital technologies in order to interact more effectively with its citizens, create new business opportunities and reduce operational costs and resource consumption, while respecting environmental factors and sustainability objectives. Transport of goods and people is at the heart of Smart City activities...
As the interest to improve road safety and traffic management is growing, a new generation standard for Vehicular Ad-hoc Networks (VANETs) need to be defined to enhance the performances of the vehicular networks’ communications, in terms of reliability, latency, and throughput. Nowadays, the IEEE 802.11p related systems such as ITS-G5, are the most...
Broadcasting urgent information is emerging as an important area of research. One of the issues posed by this subject is the delivery ratio and the transmission time that depend on several factors such as the mobility of persons, the battery of their mobile devices, etc. In this paper, we are interested in broadcasting emergency messages to inform...
Wireless sensor networks (WSNs) are composed of sensors exchanging the information that they collect from the environment. The use of a scheduler offers an efficient solution to eliminate information redundancy and possible collisions in this network. A scheduler is responsible for choosing the sensors to exchange information at each step of the al...
Due to the increasing number of vehicles in circulation in different urban cities, several automatic traffic monitoring systems have been developed. In particular, traffic monitoring systems using roadside cameras are becoming extensively deployed, as they offer imperative technological advantages compared with other traffic monitoring systems. Veh...
Multimedia transport over Wireless Sensor Networks (WSN) has been a challenging task due to the limited available resources of such networks. the capability of Multipath routing to balance and distribute the load of a given flow on different disjoint non correlated paths is a viable solution to ensure the required high throughput. Moreover, operati...
The specific characteristics of vehicular ad-hoc networks, such as high-speed of nodes and frequent topology changes, impose challenges for the routing process.
In addition, the advent of the Internet of Vehicles concept along with the autonomous and connected cars contribute to the proliferation of new innovative applications with different qualit...
As sensor nodes are power constrained, saving energy and prolonging network lifetime have been given the greatest priority in the design of routing protocols in wireless sensor networks (WSNs). In this regard, duty‐cycling is broadly utilized as an underlying MAC (Medium Access Control)‐based protocol for routing solutions. In this regard, a cross‐...
This paper presents a systematic literature review of platooning systems with a special focus on the strategies which have been adopted to validate platooning algorithms. We collect the existing studies in the platooning field. The proposed algorithms are compared based on some criteria including platooning operations, communication modes, and vali...
Since its launch in 2007, Google's open source mobile operating system Android has become the most prominent OS for smartphones. Availability of 3 million Android apps on official repository, Google Play Store, and a not too tightly controlled environment for app developers have added to the popularity of Android and growth of Android devices. This...
Cut-in into vehicle platoons is a dangerous driving maneuver that affects the safety and efficiency of platooning vehicles. An accurate prediction of such maneuver enable the
platooning system to take safety measures to ensure the platoon safety and integrity. The contribution of this paper consists of an evaluation of a set of supervised machine l...
Achieving network resiliency in terms of availability, reliability and fault tolerance is a central concern for network designers and operators to achieve business continuity and increase productivity. It is particularly challenging in increasingly virtualized network environments where network services are exposed to both hardware (e.g., bare-meta...
Software Defined Networking (SDN) is an emerging technology that introduces a new design for networking. It decouples the hardware and the software for simplifying and hiding the management part of network elements. This technology has also an interesting impact for network security since it affords automation, convergence, etc. We can benefit from...
Proving the correctness of distributed algorithms is a difficult challenge in dynamic networks. In these networks, topological changes can take place due to unexpected appearance and disappearance of devices and communication links. The existing studies in the literature lack a general model for their development and their proof. Besides, most of t...
Vehicle detection plays a significant role in traffic monitoring. Vehicle detection approaches can be used for vehicle tracking, vehicle classification and traffic analysis. However, numerous attributes like shape, intensity, size, pose, illumination, shadows, occlusion, velocity of vehicles and environmental conditions, provide different challenge...
A Wireless Sensor Network (WSN) is composed of sensors that communicate together in a distributed way to supervise the environment. The energy consumption is an important performance measure for a WSN that spurs the development of energy-efficient distributed algorithms for WSNs. In this field, we focus on a specific type of distributed algorithms...
This book contains extended versions of the best papers presented at the First International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2019, held in Hammamet, Tunisia, in October 2019.
The 9 revised full papers included in this volume were carefully reviewed and selected from 24 initial submissions. The papers are orga...
As the energy efficiency remains a key issue in wireless sensor networks, duty-cycled mechanisms acquired much interest due to their ability to reduce energy consumption by allowing sensor nodes to switch to the sleeping state whenever possible. The challenging task is to authorize a sensor node to adopt a duty-cycle mode without inflicting any neg...
Broadcasting emergency messages has been widely recognized as an important area of research. A crucial issue, in this context, is to ensure the correctness of broadcasting protocols using a formal method to prevent errors before their implementation. In this paper, we propose a new protocol for broadcasting emergency messages in order to inform per...
In recent years, cities are experiencing a deep negative impact due to traffic congestion. As the number of vehicles is increasing rapidly, traffic congestion becomes unsustainable in urban domains specially in peak hours leading to time and fuel waste, accidents, additional costs for the economy, environmental problems and consequently impaired qu...
This book constitutes the refereed proceedings of the Second International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2020, held in Bizerte, Tunisia, in December 2020. Due to the COVID-19 pandemic the conference was held online.
The 8 full papers included in this volume were carefully reviewed and selected from numerou...
The specific characteristics of vehicular ad-hoc networks, such as high-speed nodes, frequent topology changes and predefined vehicle movement paths, make mobile ad-hoc networks routing protocols not convenient to disseminate data in the vehicular environment. In addition, the new vision towards Internet of Vehicles concept along with the advent of...
Wireless Body Area Networks (WBANs), designed especially for healthcare applications require a strict guarantee of quality of service (QoS), in terms of latency, error rate and reliability. Generally, medical applications have different kinds of data traffic which may be classified into periodic, urgent or on-demand. Each type has its own requireme...
The number of connected Things is growing at a frantic pace, which has led to vertical, proprietary Internet of Things (IoT) solutions. To ensure a horizontal IoT cross-industry interoperability, eight of the word’s leading ICT standards bodies introduce the oneM2M standard. Its main goal is to satisfy the need for a common M2M Service Layer that g...
Constructing maximal cliques is a well-known problem in the graph theory. Despite this problem has been well studied for decades, few efforts have been presented in distributed computing. The main contribution of this paper is to propose a distributed algorithm, modeled by local computations, for constructing all maximal and disjoint cliques in a s...
An app named “Aqua Mail” is a Google play store app with millions of downloads. It allows the user to manage Google account mails. For caching purposes, it stores the mails in a content provider protected with a custom permission rather than Android defined permission to access mails (MANAGE_ACCOUNTS). Another app named “Enhanced SMS and call” can...
Nowadays, Wireless Body Area Networks (WBANs) are revolutionizing the field of healthcare applications which is deeply related to human life and requires a noteworthy attention. In this medical context, reliability, energy consumption and real time monitoring are the main Quality of Service (QoS) challenges to satisfy. This kind of networks relies...
In this paper, we demonstrate a realistic variant of wireless Evil Twins (ETs) for launching device to device (D2D) attacks over the network, particularly for Android. We show an attack where an ET infects an Android device before the relay of network traffic through it, and disappears from the network immediately after inflicting the device. The a...
In this paper, we demonstrate a realistic variant of wireless Evil Twins (ETs) for launching device to device (D2D) attacks over the network, particularly for Android. We show an attack where an ET infects an Android device before the relay of network traffic through it, and disappears from the network immediately after inflicting the device. The a...
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn cyberattack exposed the critical fault-lines among smart networks. Security of Internet of Things (IoT) has become a critical concern. The danger exposed by infested Internet-connected things not only affects the security of IoT, but also threatens the complete I...
This book constitutes the refereed proceedings of the 16th International Colloquium on Theoretical Aspects of Computing, ICTAC 2019, held in Hammamet, Tunisia, in October/November 2019.
The 17 revised full papers presented together with 2 keynote papers and 1 industrial paper were carefully reviewed and selected from 138 submissions.
The papers are...