Nader Mbarek

Nader Mbarek
University of Burgundy | UB · Laboratoire D'Informatique de Bourgogne (LIB)

PhD - HDR

About

82
Publications
4,011
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
201
Citations
Additional affiliations
January 2019 - present
University of Burgundy
Position
  • Professor (Associate)
Description
  • Networking Research Axis Leader
September 2008 - December 2018
University of Burgundy
Position
  • Professor (Associate)
Description
  • RAMoN project Leader
September 2007 - August 2008
ENSEIRB - MATMECA
Position
  • Research Assistant

Publications

Publications (82)
Chapter
L’Internet des objets (en anglais Internet of Things, IoT), aujourd’hui omniprésent, a grandement contribué à l’accroissement du trafic des données sur Internet. Les technologies d’accès IoT et les contraintes des objets peuvent causer des problèmes de performances et de sécurité. Cela démontre l’importance des défis liés à cet environnement comme...
Chapter
L’Internet des objets (en anglais Internet of Things, IoT), aujourd’hui omniprésent, a grandement contribué à l’accroissement du trafic des données sur Internet. Les technologies d’accès IoT et les contraintes des objets peuvent causer des problèmes de performances et de sécurité. Cela démontre l’importance des défis liés à cet environnement comme...
Article
Full-text available
Nowadays, providing Internet of Things (IoT) environments with service level guarantee is a challenging task. Moreover, IoT services should be autonomous in order to minimize human intervention and thus to reduce the operational management cost of the corresponding big scale infrastructure. We describe in this paper a service level-based IoT archit...
Article
The use of a localization system is necessary in Wireless Sensor Networks (WSN) either for communication protocols (geographic routing) or for various applications (person tracking, battlefield tele-monitoring, enemy detection, etc.). The objective of a localization method in such environment is to find the locality (or position) of all sensors dep...
Conference Paper
Energy optimization is essential in IoT environments due to energy constraints for some IoT components. In fact, energy consumption has a direct impact on IoT system lifetime, which represents an important Quality of Service (QoS) parameter for IoT environments. In order to extend the IoT system lifetime, energy consumption optimization should be c...
Conference Paper
In recent years, various meta-heuristics have been used to improve the accuracy of localization methods in WSN (Wireless Sensor Networks). In this work, we propose a novel hybrid method for localization based on DV-Distance localization technique and the Fruit fly Optimization Algorithm (FOA). We specify a two-phase scheme while using the search ca...
Chapter
In this chapter we introduce the IoT environment through architectures proposed by different standardization bodies. We describe the importance of managing security and the protection of privacy in this kind of environment. Further, the authors highlight the needs and requirements of each layer in the IoT architecture in terms of QoS as well as in...
Book
Networks are now embedded in daily life thanks to smaller, faster, inexpensive components that are more powerful and increasingly connected. Parallel to this quantitative explosion of communication networks, technology has become more complex. This development comes with challenges related to management and control, and it has become necessary to m...
Chapter
Cloud‐type environments are omnipresent and growing larger. The main research challenges in this environment are not only service level guarantees, integrating Quality of Service (QoS) and security, but also the management of these services in accordance with a Service Level Agreement. This chapter first describes the Cloud environment in terms of...
Chapter
Telecommunication networks today make it possible to respond to an essential need for all users: the ability to communicate in one's daily and professional life. Wireless networks led to the rise of several categories of services with different characteristics. In recent years, researchers have largely focused on a new category of networks, called...
Article
Exchanged emails of both personal and business contexts are among the most information sources that are particularly useful in Business Process Management (BPM). Thus, the information flux given by exchanged emails represents an essential part of multi-actor cooperation to achieve any required process. Email contents may be extracted and processed...
Preprint
Full-text available
In this paper, we present two deterministic leader election algorithms for programmable matter on the face-centered cubic grid. The face-centered cubic grid is a 3-dimensional 12-regular infinite grid that represents an optimal way to pack spheres (i.e., spherical particles or modules in the context of the programmable matter) in the 3-dimensional...
Article
In this article, we present two deterministic leader election algorithms for programmable matter on the face‐centered cubic grid. The face‐centered cubic grid is a three‐dimensional 12‐regular infinite grid that represents an optimal way to pack spheres (i.e., spherical particles or modules in the context of the programmable matter) in the three‐di...
Book
Le réseau devient embarqué dans notre vie quotidienne grâce à des composants de plus en plus petits, peu coûteux, puissants, rapides et de plus en plus connectés entre eux. Parallèlement à cette explosion quantitative des réseaux de communication, les technologies se complexifient. Cette évolution s’accompagne de challenges en termes de gestion et...
Chapter
Dans ce chapitre de livre, Ahmad Khalil, Nader Mbarek et Olivier Togni présentent l’environnement de type Internet des objets à travers les architectures proposées par différents organismes de standardisation et décrivent l’importance de la gestion de la sécurité et la protection de la vie privée dans ce type d’environnement. De plus, les auteurs m...
Chapter
Le réseau devient embarqué dans notre vie quotidienne grâce à des composants de plus en plus petits, peu coûteux, puissants, rapides et de plus en plus connectés entre eux. Parallèlement à cette explosion quantitative des réseaux de communication, les technologies se complexifient. Cette évolution s’accompagne de challenges en termes de gestion et...
Chapter
Le réseau devient embarqué dans notre vie quotidienne grâce à des composants de plus en plus petits, peu coûteux, puissants, rapides et de plus en plus connectés entre eux. Parallèlement à cette explosion quantitative des réseaux de communication, les technologies se complexifient. Cette évolution s’accompagne de challenges en termes de gestion et...
Conference Paper
Access Control is an important security service that should be considered in IoT environments in order to offer reliable IoT services. Access control in IoT environments concerns not only the access of IoT users to IoT services and objects, but also the access of IoT objects to IoT gateways. In this paper, we specify an access control mechanism tha...
Article
In the 21st century, the wireless technology is still developing rapidly and trying to be ‘Faster, Higher, and Stronger’: faster data rate, higher bandwidth and stronger connectivity. Wireless Mesh Networks (WMN) have been envisioned as an important solution to the next generation wireless networking which can be used in wireless community networks...
Conference Paper
In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data con...
Article
Enabling service level guarantee within IoT (Internet of Things) environments is an important and a challenging task in order to enhance user experience while using IoT applications. The corresponding user service level expectations could be specified in a Service Level Agreement (SLA) that we have to conclude with the IoT Service Provider for each...
Conference Paper
The autonomy has become a main subject in the dynamic management of the radio spectrum for cognitive radio networks. A new mechanism can help to broaden the concept of learning environment by setting constraints and objec-tives that are adaptable to our visions of the future generations of networks. This mechanism will be seen as a solution that wi...
Chapter
Nowadays, providing Internet of Things (IoT) environments with service level guarantee is a challenging task. We describe in this paper a service level based IoT architecture that enables an IoT Service Level Agreement (iSLA) achievement between an IoT Service Provider and an IoT Client. This IoT SLA specifies the requirements of an IoT service in...
Chapter
The context of this paper is programmable matter, which consists of a set of computational elements, called particles, in an infinite graph. The considered infinite graphs are the square, triangular and king grids. Each particle occupies one vertex, can communicate with the adjacent particles, has the same clockwise direction and knows the local po...
Article
Full-text available
Providing Internet of Things (IoT) environments with service level guarantee is a challenging task for improving IoT application usage experience. We specify in this paper an IoT architecture enabling an IoT Service Level Agreement (iSLA) achievement between an IoT Service Provider (IoT-SP) and an IoT Client (IoT-C). In order to guarantee the IoT a...
Conference Paper
The context of this paper is programmable matter, which consists of a set of computational elements, called particles, in an infinite graph. The considered infinite graphs are the square, triangular and king grids. Each particle occupies one vertex, can communicate with the adjacent particles, has the same clockwise direction and knows the local po...
Preprint
Full-text available
The context of this paper is programmable matter, which consists of a set of computational elements, called particles, in an infinite graph. The considered infinite graphs are the square, triangular and king grids. Each particle occupies one vertex, can communicate with the adjacent particles, has the same clockwise direction and knows the local po...
Conference Paper
Providing users with a service level guarantee in the Internet of Things (IoT) is a challenging task in order to ensure a better user experience in such environment. We present in this paper an adaptation of the slotted Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA) method used in the Media Access Control (MAC layer) of the IEEE 8...
Conference Paper
Nowadays, providing Internet of Things (IoT) environments with service level guarantee is a challenging task. We describe in this paper a service level based IoT architecture that enables an IoT Service Level Agreement (iSLA) achievement between an IoT Service Provider and an IoT Client. This IoT SLA specifies the requirements of an IoT service in...
Article
Many companies decided to move towards the cloud computing technology in order to manage, monitor and explore huge space data amount in the space ground data systems. The corresponding transition adaptation needs a study to classify each space related service in the appropriate cloud computing service model layer; SaaS, PaaS and IaaS. In this paper...
Conference Paper
Nowadays, providing IoT environments with service level guarantee is a challenging task. We propose a framework for IoT service level guarantee thanks to several specific Service Level Agreements (SLAs) for IoT environments. We specify different SLAs for each entity contributing in our IoT architecture in order to conclude a global SLA called IoT-S...
Article
Nowadays, the term cloud computing often falsely assumes the availability of an unlimited pool of resources. On the contrary, if a cloud provider reaches its limits, it may pose the risk of breaking their service level agreement (SLA). Space agencies could start using the cloud computing model within their IT infrastructure with multiple ground con...
Chapter
This chapter introduces the application of autonomic computing principles within vehicular ad hoc networks' (VANETs') environments in order to enhance the performance of QoS-based communications thanks to the self-management concept. In such environments, the design of a QoS-based broadcasting protocol is presented as a usage case. A state of the a...
Article
One serious concern in the ubiquitous networks is the seamless vertical handover management between different wireless technologies. To meet this challenge, many standardization organizations proposed different protocols at different layers of the protocol stack. The Internet Engineering Task Force (IETF) has different groups working on mobility at...
Article
Nowadays, the term cloud computing often falsely assumes the availability of an unlimited pool of resources. On the contrary, if a cloud provider reaches its limits, it may pose the risk of breaking their service level agreement (SLA). Space agencies could start using the cloud computing model within their IT infrastructure with multiple ground con...
Article
Full-text available
Quality of service (QoS) in wireless mesh networks is an active area of research, which is driven by the increasing demand for real-time and multimedia applications, such as Voice over IP and Video on Demand. In this paper, we propose a novel QoS based routing protocol for wireless mesh infrastructure, called Hybrid QoS Mesh Routing (HQMR). It is c...
Conference Paper
Quality of service (QoS) in wireless mesh networks (WMN) is an active area of research, which is driven by the increasing demand for real-time and multimedia applications, such as VoIP (Voice over IP) and VoD (Video on Demand). In this paper, we propose a QoS multi-tree based routing protocol for wireless mesh en-vironments, named Inter-Mesh Infras...
Conference Paper
Today, the Cloud networking aspect is a critical factor for adopting the Cloud computing approach. The main drawback of Cloud networking consists in the lack of Quality of Service (QoS) guarantee and management in conformance with a corresponding Service Level Agreement (SLA). This paper presents a framework for resource allocation according to an...
Article
Today, cloud networking which is the ability to connect users with their cloud services and to interconnect these services in an inter-cloud approach, is one of the recent research areas within the cloud computing research communities. The main drawback of cloud networking consists in the lack of Quality of Service (QoS) guarantee and management in...
Conference Paper
Full-text available
Wireless Mesh Networks (WMNs) have been considered as a promising alternative to conventional wired networks, thanks to its flexibility and easy deployment. Thus, to ensure a satisfying level of QoS guarantees for real-time and streaming applications such as Voice over IP (VoIP) and Video on Demand (VoD), we propose a novel QoS based routing protoc...
Article
Full-text available
Wireless Mesh Networks (WMNs) have been attracting more and more interest from both academic and industrial environments for their seamless broadband connectivity to Internet networks. Besides, providing QoS guarantees for real-time and streaming applications such as Voice over IP (VoIP) and Video on Demand (VoD) is a challenging issue in such envi...
Conference Paper
Today, cloud networking is one of the recent research areas in the cloud computing research communities. The main drawback of cloud networking consists in the lack of Quality of Service (QoS) guarantee and management in conformance with a corresponding Service Level Agreement (SLA). In this paper, we propose a framework for self-establishing an end...
Article
Full-text available
This paper deals with broadcasting problem in vehicular ad hoc networks (VANETs). This communication mode is commonly used for sending safety messages and traffic information. However, designing an efficient broadcasting protocol is hard to achieve since it has to take into account some parameters related to the network environment, for example, th...
Conference Paper
Full-text available
With the growth of wireless networks, Wireless Mesh Network (WMN) has appeared as an emerging key solution for broadband Internet access with a low-cost deployment. Moreover, providing QoS guarantees for real-time and streaming applications such as VoIP (Voice over IP) and VoD (Video on Demand) is a challenging issue in such environment. In this pa...
Conference Paper
Today, cloud networking which is the ability to connect the user with his cloud services and to interconnect these services within an inter-cloud approach, is one of the recent research areas in the cloud computing research communities. The main drawback of cloud networking consists in the lack of Quality of Service (QoS) guarantee and management i...
Article
Full-text available
The broadcasting communication mode is widely used in Vehicular Ad hoc Networks (VANETs). It is used for sending emergency messages, road-traffic information or to help routing protocols to determine routes. This communication mode is known to be hard to achieve efficiently since it depends on the network density. Indeed, broadcasting methods may c...
Conference Paper
A key requirement to provide seamless mobility and guaranteeing Quality of Service in heterogeneous environment is to select the best destination network during handover. In this paper, we propose a new schema for network selection based on Multiple Linear Regression Model (MLRM). A horough investigation, on a huge live data collected from GPRS/UMT...
Conference Paper
Full-text available
Broadcasting is widely used in Vehicular Ad hoc Networks (VANETs) but it is hard to achieve efficiently since it depends on the network density, i.e. may cause network congestion if the protocols are not well designed. This paper introduces a novel Autonomic Dissemination Method (ADM) which delivers messages in accordance with given priority and de...
Conference Paper
Today, cloud networking which is the ability to connect the user with his cloud services and to interconnect these services within an inter-cloud approach, is one of the recent research areas in the cloud computing research communities. The main drawback of cloud networking consists in the lack of Quality of Service (QoS) assurance and management i...
Article
We propose a new media access control (MAC) layer enabling quality of service (QoS) multicast scheme for IEEE 802.11s networks, where a unicast routing protocol called hybrid wireless mesh protocol (HWMP) is defined. The HWMP protocol is more adapted for best effort traffic that is why its usage is not suitable for real time multimedia applications...
Article
Full-text available
The broadcasting communication mode is widely used in Vehicular Ad~hoc Networks (VANETs). It is used for sending emergency messages, road-traffic information or to help routing protocols to determine routes. This communication mode is known to be hard to achieve efficiently since it depends on the network density. Indeed, broadcasting methods may c...
Article
In this paper, we propose a dynamic update of the HWMP (Hybrid Wireless Mesh Protocol) proactive tree by changing dynamically the path request (PREQ) transmission interval, instead of a periodic fixed value as defined in the IEEE 802.11s standard. Indeed, we adapt dynamically the value of the PREQ transmission interval according to the wireless env...
Article
Seamless handover between networks in heterogeneous environment is essential to guarantee end-to- end QoS for mobile users. A key requirement is the ability to select seamlessly the next best network. Currently, the implementation of the selection algorithm of the IEEE 802.21 standard by National Institute of Standards and Technology considers only...
Conference Paper
The goal of the pervasive connectivity is to enable mobile users to be permanently connected to the Internet. Mobile users are often connected to wireless networks and consuming services that require quality of service guarantees. Accessing services using wireless technologies may make the service delivery vulnerable to security attacks because of...
Conference Paper
Seamless Handover between networks in heterogeneous environment is essential to guarantee end-to-end QoS for mobile users. A key requirement is the ability to select the next best network. Currently, the implementation of the IEEE 802.21 standard by National Institute of Standards and Technology (NIST) considers only the signal strength as a parame...
Article
The IEEE 802.11s standard defines a path selection algorithm, named HWMP (Hybrid Wireless Mesh Protocol) which combines on-demand path selection mode with a proactive tree building mode. The proactive tree building mode in HWMP periodically maintains the routing table according to a constant value. Varying this value will affect directly the number...
Article
Full-text available
Based on the IP technology, the next generation networks (NGN) must overcome the main drawbacks of this technology consisting in the lack of quality of service (QoS), security and mobility management. To ensure a service offer in an NGN environment, a protocol for negotiating a service level can be used. However, most of the existing negotiation pr...
Conference Paper
In this paper, we specify a global service level guarantee including not only QoS but also security and taking into account user mobility. This global service level could be guaranteed within several autonomic computing systems managed by different autonomic domain managers. For that purpose, we propose an end-to-end Service Level Negotiation Proto...
Article
In this paper, we propose an end-to-end service level negotiation protocol which enables a global service offer covering quality of service (QoS) and security while taking into account user's mobility in this offer. This protocol provides all the domains involved in the transport of a various offered services with a negotiation capability to achiev...
Conference Paper
hosted by the International Conference in Telecommunications and Multimedia
Conference Paper
Providing negotiation capability in self-management environments is a challenging area of research. This paper describes the usage of a negotiation protocol called SLNP (service level negotiation protocol) to achieve an agreement for an end-to-end QoS guarantee across heterogeneous domains using different local QoS models for wireless and wired tec...
Conference Paper
Autonomic systems interaction is a challenging area of research. In this paper, we provide autonomic systems with a new interaction capability thanks to the negotiation of a service level in a self-management framework describing vertical and horizontal interactions. We use interoperable Web Services technologies to specify a service level negotiat...
Conference Paper
Autonomic systems interaction is a challenging area of research. We describe a framework for service level negotiation within self-management systems using two kinds of interactions: vertical and horizontal. In the proposed framework, we provide autonomic systems with a new interaction capability thanks to the negotiation with their peers. The nego...
Article
We propose a framework for service level negotiation within s elf-management systems. The negotiation process occurs between high-level autonomic managers to guarantee an end-to-end service level for specific application traffic flows. In the proposed framework, we provide autonomic systems with a new interaction opportunity thanks to the negotiati...
Conference Paper
Full-text available
Dans le monde IP, avec l'émergence de nouveaux services, la garantie d'une certaine qualité de service (QoS) de bout en bout est devenue un enjeu primordial. Pour ce faire, les responsables des domaines impliqués dans une offre de QoS doivent se mettre d'accord sur le niveau de service qu'ils peuvent garantir. C'est dans le cadre de cette négociati...
Conference Paper
Full-text available
This paper describes a signaling environment for service level negotiation and advance resource reservation in mobile IP networks. This environment is built in conformance with the generic signaling environment, which is standardized by the NSIS IETF working group. The service level negotiation protocol, called SLN NSLP, integrates the NSIS archite...
Technical Report
Multi-media services and other critical multi-site services (e.g. VPN) are becoming mainstream, and require a guaranteed Quality of Service (QoS). Services need to be established across several Autonomous Systems (ASes), often to connect end-users. Thus, provisioning and control of end-to-end QoS requirements arise as ones of the main challenges in...
Conference Paper
Full-text available
We propose a framework for service level negotiation in autonomous systems management. The negotiation process occurs between high-level autonomic managers to guarantee an end-to-end service level for specific application traffic flows. In the proposed framework, we provide autonomous systems with a new interaction opportunity thanks to the negotia...
Technical Report
Full-text available
Ce livrable traite de la négociation dynamique de SLA/SLS et du maintien des paramètres négociés lors de la mobilité du terminal dans le cadre d'une signalisation NSIS. Il fait suite au livrable 4.1 qui présentait un assistant de négociation, coté terminal utilisateur, permettant de négocier dynamiquement les SLA/SLS avec le/les fournisseurs de ser...
Conference Paper
Full-text available
This paper presents an assistant to help the user in negotiating the desired quality of service in a dynamic environment using the agent technology. A multi-agent system is proposed in order to solve problems and accomplish tasks in a distributed and autonomous way. This user assistant negotiates dynamically the QoS (quality of service) on the user...