Nasreddine Lagraa

Nasreddine Lagraa
Université Amar Telidji Laghouat · Department of Mathematics and Computer Science

Doctorat

About

85
Publications
14,001
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,099
Citations

Publications

Publications (85)
Article
Full-text available
Remotely monitoring people’s healthcare is still among the most important research topics for researchers from both industry and academia. In addition, with the Wireless Body Networks (WBANs) emergence, it becomes possible to supervise patients through an implanted set of body sensors that can communicate through wireless interfaces. These body sen...
Article
Full-text available
This paper proposes a sequential rules-based recommendation system, called STS-Rec. It addresses the main drawbacks of sequential patterns mining approaches for POI (Point of interest) recommendation by considering both temporal and social influences to perform short-term recommendations. STS-Rec first transforms mobility data into location sequenc...
Article
Full-text available
The deployment of a swarm of cooperative Unmanned Aerial Vehicles (UAVs) to pursue a mission is knowing an increasing success nowadays. This is mainly because deploying a group of cooperating UAVs instead of one single UAV offers numerous advantages, including the extension of the mission coverage, fault tolerance in case of losing a UAV during a m...
Article
Full-text available
Vehicular Social Networks (VSNs) is the bridge of social networks and Vehicular Ad-Hoc Networks (VANETs). VSNs are promising as they allow the exchange of various types of contents in large-scale through Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication protocols. Vehicular Named Data Networking (VNDN) is an auspicious comm...
Preprint
Named Data Networking (NDN) is a prominent realization of the vision of Information-Centric Networking. The NDN architecture adopts name-based routing and location-independent data retrieval. Among other important features, NDN integrates security mechanisms and focuses on protecting the content rather than the communications channels. Along with a...
Article
Named Data Networking (NDN) is a prominent realization of the vision of Information-Centric Networking. The NDN architecture adopts name-based routing and location-independent data retrieval. Among other important features, NDN integrates security mechanisms and focuses on protecting the content rather than the communications channels. Along with a...
Article
Vehicular Fog Computing exploits the computing , caching and communication resources at vehicles to facilitate different location-based applications in a smart urban environment. Today, consumer vehicles can discover and consume available services from nearby vehicles, acting as provider vehicles in a fog network. However, it is challenging for the...
Chapter
The quick revolution on the wireless communication technologies had opened the gate towards promising implementations; Vehicular-Ad-hoc Networks (VANETs) and the safety-enhancing applications provided by the Internet of Vehicles (IoV) paradigm are one of them. By periodically broadcasting safety-beacons, vehicles can ensure a better safety-driving...
Article
Full-text available
Named data networking (NDN) is one of the emerging and promising paradigms of the future internet architecture. An essential feature in NDN is in-network caching, where the contents are decoupled from their physical locations to achieve an effective and consistent content distribution. However, caching capacity in NDN is relatively small and cannot...
Article
Full-text available
This paper addresses the fundamental problem of the trade-off between resource efficiency and user satisfaction in the limited environments of Named Data Networks (NDNs). The proposed strategy is named RADC (Resource Allocation based Data Classification), which aims at managing such trade-off by controlling the system’s fairness index. To this end,...
Article
Integrating unmanned aerial vehicles (UAV) into the cloud environment aims to put their onboard equipment and capabilities at the service of end users at an affordable cost. Coupling both technologies will help leveraging them as a strong and novel service provider. This integration incolves service infrastructures, services offer and request proto...
Conference Paper
In a jiffy after the outbreak of the 2019 novel coron-avirus, also called COVID-19 or SARS-CoV-2, the World Health Organization (WHO) considered it as a pandemic that threatens the demise of humanity. This quick decision was in conjunction with a real situation of biological inability to find a vaccine that can eliminate the virus or at least limit...
Conference Paper
The quick revolution on the wireless communication technologies had opened the gate towards promising implementations; Vehicular-Ad-hoc Networks (VANETs) and the safety-enhancing applications provided by the Internet of Vehicles (IoV) paradigm are one of them. By periodically broadcasting safety-beacons, vehicles can ensure a better safety-driving...
Conference Paper
Unmanned Aerial Vehicles (UAVs) cloud have attracted wide attentions from both industrial and academic communities as a new paradigm offering flexible services. This new concept utilizes the recent technologies of mobile cloud computing. The collaboration between these technologies represents a fantastic vision of the future, where everything is co...
Article
Most of Flying Adhoc Networks (FANETs) applications consume GPS based location information for their services, which are also shared in real-time with other UAVs, ground control stations and centralized service operators. GPS spoofing is among the most popular attacks in FANETs that lead the Global Navigation Satellite System (GNSS) receivers to ge...
Conference Paper
With the emergence of connected and intelligent vehicles, various research projects aiming at reducing traffic accidents by detecting driver behavior have also emerged. These vehicles are generally equipped with cameras and sensors that can be used to detect driver's fatigue, drowsiness, and distraction using different technologies and a multitude...
Article
Workflows and workflow scheduling are increasingly used in many applications with many tasks and dependency constraints between these tasks. On the other hand, cloud computing offers huge opportunities to process large-scale workflows and data-intensive applications. The processing performance of a workflow is highly depending on how the different...
Article
Vehicular Ad-hoc Networks (VANETs), which are a subclass of Mobile Ad-hoc Networks (MANETs), received a widespread attention during the last decades. With these promising set of safety applications, which are the main reason why they were developed, VANETs are considered as a tremendous support for the Intelligent Transportation Systems (ITS). Howe...
Conference Paper
The deployment of a swarm of cooperative UAVs applications for the execution of distributed tasks has increased attention from both academia and industry researchers. The use of a group of UAVs instead of one single UAV offers many advantages like extending the mission coverage, providing a reliable ad-hoc networks services, and enhancing the servi...
Article
Full-text available
Mobility prediction of vehicles has become a key feature in mobility management in smart cities, mobile computing environments, intelligent transportation systems, vehicular networks, and location-based services. It has several important applications in traffic congestion forecasting, location-based routing protocol designs and targeting advertisem...
Article
Named Data Networking (NDN) is a promising candidate for Future Internet Architecture (FIA), where the focus of communication is the content itself rather than the source of the requested content. NDN is one of the implementations of Information-Centric Networking (ICN). Among other salient features, NDN provides intrinsic security where security i...
Article
Routing in cooperative UAVs networks is a challenging task due to mobility of nodes, dynamically changing topology and three-dimensional (3D) movement. In this work, we study the fleet routing problem in FANET, which aims at delivering data to a specific group of mobile drones identified by their geographical location. Although many fleet routing p...
Conference Paper
Named Data Networking (NDN) is a promising candidate for future internet architecture. It is one of the implementations of the Information-Centric Networking (ICN) architectures where the focus is on the data rather than the owner of the data. While the data security is assured by definition, these networks are susceptible of various Denial of Serv...
Article
Vehicular cloud (VC) is a promising environment, where intelligent transport applications can be developed relying on mobile vehicles, which can be both cloud users and cloud service providers. It enables vehicles that have sufficient resources to act as mobile cloud servers by offering a variety of services to users' vehicles. In this context, to...
Conference Paper
Vehicular Adhoc Networks (VANET) is the backbone technology behind Intelligent Transportation Systems (ITS) which offers a plethora of safety and comfort applications. With their powerful computation and storage capacities, vehicles themselves can play the role of services producers, thus, realizing the concept of Vehicular Clouds (VC) within the n...
Article
Full-text available
With the deployment of multimedia services over VANETs, there is a need to develop new techniques to insure various levels of quality of services (QoS) for real time applications. However, in such environments, it is not an easy task to determine adequate routes to transmit data with specific application QoS requirements. In this paper, we propose...
Article
Vehicular ad hoc networks (VANET) are gaining popularity for enabling a wide range of applications for road traffic safety, infotainment and road transportation management. For real-time applications to be successfully deployed in VANET, their quality of service (QoS) requirements need to be met. In this paper, we propose a QoS-based routing protoc...
Article
The Internet of Vehicles (IoVs) has emerged as a new spin-off research theme from traditional vehicular ad hoc networks (VANETs). It employs vehicular nodes connected to other smart objects equipped with a powerful multi-sensor platform, communication technologies, and IP-based connectivity to the Internet, thereby creating a possible social networ...
Article
Full-text available
Flying Ad hoc Network (FANET) is a new resource-constrained breed and instantiation of Mobile Ad hoc Network (MANET) employing Unmanned Aerial Vehicles (UAVs) as communicating nodes. These latter follow a predefined path called ’mission’ to provide a wide range of applications/services. Without loss of generality, the services and applications offe...
Article
Full-text available
Vehicular Cloud (VC) is a promising paradigm in which mobile vehicles can be both cloud users and service providers. It enables vehicles that have sufficient resources to act as mobile cloud servers by offering a wide range of services to user's vehicles. However, user vehicles need to discover provider vehicles along with their services, and reque...
Article
Efficient information dissemination is the pinnacle of Vehicular Ad-hoc Networks (VANETs). In case of delay-sensitive information such as safety-related messages, it is imperative to minimize the transmission delay and increase the message reliability in VANETs. In a previous work, we proposed a Time-Limited Reliable Broadcast Incremental Power (TR...
Conference Paper
Ensuring the required trustiness among communicating peers is an important task in Vehicular Adhoc Networks (VANETs), especially for safety-related applications where the margin of error is extremely undesired. Most the safety applications are a kind of decision aided system, and final decision is always taken by humans. Thus, in addition to securi...
Article
Full-text available
Ensuring the desired level of security is an important issue in all communicating systems, and it becomes more challenging in wireless environments. Flying Adhoc NETworks (FANETs) are an emerging type of mobile network that is built using energy-restricted devices. Hence, the communications interface used and that computation complexity are additio...
Article
In the last few decades, location privacy preservation is considered by researchers as a challenge for enabling the deployment of Vehicular Ad Hoc Networks (VANETs). In fact, the continuous periodical broadcast of spatiotemporal information contained in beacons permits to a global passive adversary to link pseudonyms and reconstruct all vehicle tra...
Conference Paper
Measuring vehicles density and distribution in urban environments is an important task. The results of such estimation are highly required for different applications such as road lights configuration, congestion control, and also inter-vehicle data routing. This task, which is known as crowd sensing, is mostly based on smartphone-assisted sensing....
Article
Location privacy preservation is considered as a challenge for deploying vehicular ad hoc networks (VANETs). In fact, the continuous periodical broadcast of spatiotemporal information in beacons allows a global passive adversary (GPA) to link pseudonyms and reconstruct vehicle traces. Consequently, it is imperative that a vehicle selects the right...
Article
The random deployment of nodes is commonly used in wireless sensor networks (WSNs), because of either the hostility of the monitored area or its large scale. However, many applications and protocols are position-based. Hence, it's necessary to determine the position of sensors even after their deployment. Localisation techniques using mobile beacon...
Article
Detecting malicious and selfish nodes is an important task in Vehicular Adhoc NETworks (VANETs). Various proposals adopted trust management as an alternative solution since it is less costly than cryptography-based solution in terms of computation delay and mobility support. However, the existing solutions assume that, in general, the attackers hav...
Article
Full-text available
Mobility prediction is an important problem having numerous applications in mobile computing and pervasive systems. However, many mobility prediction approaches are not noise tolerant, do not consider collective and individual behavior for making predictions, and provide a low accuracy. This paper addresses these issues by proposing a novel depende...
Article
Communication‐induced checkpointing (CIC) protocols aim at finding consistent global checkpoint from which a system can safely restart without the risk of domino effect. CIC class gives processes the maximum autonomy for taking their local checkpoints while directs them to take forced checkpoints when harm patterns are detected. Such patterns can c...
Conference Paper
Ensuring the desired security is an important issue in all communicating systems and it becomes more challenging in open medium networks. Furthermore, the majority of the wireless and mobile networks including Flying Adhoc NETworks (FANETs) are built over energy-restricted devices . Hence, communication interface and computation complexity are addi...
Conference Paper
Full-text available
Considered as a primordial component of Cooperative Intelligent Transportation Systems (C-ITS), Vehicular Ad Hoc Network (VANET) plays a weighty role to facilitate different on-road applications, most of which primary rely on multi hop communications. To ensure reliability and security of such communication, it is very pertinent to guarantee that t...
Article
Full-text available
The process of routing in Vehicular Ad hoc Networks (VANET) is a challenging task in city environments. Finding the shortest end-to-end connected path satisfying delay restriction and minimal overhead is confronted with many constraints and difficulties. Such difficulties are due to the high mobility of vehicles, the frequent path failures, and the...
Article
Vehicular ad hoc networks are vulnerable to insider attacks like dropping safety messages and injecting bogus ones. A typical solution to this problem is to use the local revocation by making each vehicle responsible for monitoring its neighbours and notifying the newcomers through accusation messages. There are multiple solutions that have been pr...
Article
Full-text available
Mobility prediction is an important problem having numerous applications in mobile computing and pervasive systems. However, many mobility prediction approaches are not noise tolerant, do not consider collective and individual behavior for making predictions, and provide a low accuracy. This paper addresses these issues by proposing a novel depende...
Article
Full-text available
Cooperative Intelligent Transportation Systems (C-ITS), mainly represented by vehicular ad-hoc networks (VANETs), are among the key components contributing to the Smart City and Smart World paradigms. Based on the continuous exchange of both periodic and event triggered messages, smart vehicles can enhance road safety, while also providing support...
Article
A trust establishment scheme for enhancing inter-vehicular communication and preventing DoS attacks 'TFDD' is proposed in this paper. Based on a developed intrusion detection module (IDM) and data centric verification, our framework allows preventing DDoS attacks and eliminating misbehaving nodes in a distributed, collaborative and instantaneous ma...
Conference Paper
Detecting malicious and selfish nodes is an important task in Vehicular Adhoc NETworks (VANETs). Various proposals adopted trust management as an alternative solution for it is less costly in terms of computation delay and mobility adaptation, compared to the cryptography-based solutions. However, the existing solutions assume that in general the a...
Article
Trust establishment over vehicular networks can enhance the security against probable insider attackers. Regrettably, existing solutions assume that the attackers have always a dishonest behavior that remains stable over time. This assumption may be misleading, as the attacker can behave intelligently to avoid being detected. In this paper, we prop...
Conference Paper
Cooperative intelligent transportation systems (C-ITS), mainly represented by Vehicular Ad Hoc Networks (VANETs), were developed to enhance safety on roads before being generalized to support other comfort and efficiency applications. Most VANET applications, including safety ones, are based on multi-hop communications. Hence, a certain trustworthi...
Conference Paper
Enhancing road safety is the main goal of Vehicular Adhoc Networks (VANETs). However, the assumption that all peers are honest and cooperative can lead to catastrophic situations. To deal with such misbehaving peers, trust establishment can be used to enhance the security without affecting network performance. In this paper, we propose an opportuni...
Article
In this paper we propose a novel trust establishment architecture fully compliant with the ETSI ITS standard which takes advantage of the periodically exchanged beacons (i.e CAM) and event triggered messages (i.e DENM). Our solution, called T-VNets, allows estimating the traffic density, the trust among entities, as well as the dishonest nodes dist...
Conference Paper
Full-text available
It is a challenging task to develop an efficient routing solution for a reliable data delivery in urban vehicular environments. Indeed, it is difficult to find a shortest end-to-end connected path especially in urban city given the mobility pattern of the vehicles and the various obstructions to a clear transmission such as buildings. To overcome t...
Article
Vehicular Ad-Hoc Network (VANet) is an emerging research area, it offers a wide range of applications including safety, road traffic efficiency, and infotainment applications. Recently researchers are studying the possibility of making use of deployed VANet applications for data collection. In this case, vehicles are considered as mobile collectors...
Article
Full-text available
In this work, we suggest an approach of signal inversion from sensors used in eddy current (EC) nondestructive testing (NDT). The aim is to characterize surface cracks from the EC signal. A methodology that combines 3D finite element (FEM) simulation and a data inversion by neural networks (NN) is proposed. We show that the use of a set of numerica...
Conference Paper
Full-text available
The advent of commercial drones or unmanned areal vehicles (UAV) is expected to facilitate the deployment of a plethora of UAV-based applications. As a result, we expect UAVs to cooperate in ad hoc fashion and joint existing vehicular ad hoc networks. In this paper, we propose a novel routing scheme for Vehicular Ad hoc Networks (VANets) by using u...
Conference Paper
Delivering data through the most reliable and trusted path is essential for any kind of network. Moreover, in highly mobile and dynamic networks such as VANETs, the problem is more complex since every node requires, at least, a previous knowledge about its own neighborhood to select the most adequate path. In addition, the open communication medium...
Conference Paper
Full-text available
Routing in Vehicular Ad hoc Networks (VANETs) is an important factor to ensure a reliable and efficient delivery of data packets. In urban environments, routing protocols must efficiently handle the constantly changing network topology and frequent disconnections due to the high mobility and direction changes of vehicles. The challenge is greater w...
Article
Routing in cooperative vehicular networks is a challenging task because of high mobility of vehicles and difficulty of localization. In this paper, we study the geocast routing problem in Vehicular Ad-hoc NETworks (VANETs), which aims at delivering data to a specific group of mobile vehicles identified by their geographical location. Although many...
Article
An important application in wireless networks is data collection. It aims to gather and deliver specific data for concerned authorities. Many researchers invest in vehicular ad hoc networks for that purpose to acquire data from different sources on the roads as from its vicinity. A vehicle is considered as a mobile data collector, it gathers real-t...
Article
This paper presents a Fast Non-Blocking coordinated checkpointing protocol for distributed systems with the aim of minimizing the number of requests and mutable checkpoints while reducing the checkpointing latency. Our protocol relies on two mechanisms; the first one is piggybacking dependency information on computation and reply message, thereby,...