
Yacine Ghamri-Doudane- La Rochelle Université
Yacine Ghamri-Doudane
- La Rochelle Université
About
287
Publications
55,337
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,613
Citations
Current institution
Publications
Publications (287)
The Internet of Vehicles (IoV) is transforming transportation by enhancing connectivity and enabling autonomous driving. However, this increased interconnectivity introduces new security vulnerabilities. Bot malware and cyberattacks pose significant risks to Connected and Autonomous Vehicles (CAVs), as demonstrated by real-world incidents involving...
The rapid growth of decentralized finance (DeFi) has led to the widespread use of automated agents, or bots, within blockchain ecosystems like Ethereum, Binance Smart Chain, and Solana. While these bots enhance market efficiency and liquidity, they also raise concerns due to exploitative behaviors that threaten network integrity and user trust. Thi...
Blockchained federated learning (BFL) combines the concepts of federated learning and blockchain technology to enhance privacy, security, and transparency in collaborative machine learning models. However, implementing BFL frameworks poses challenges in terms of scalability and cost-effectiveness. Reputation-aware BFL poses even more challenges, as...
Blockchain-based Federated Learning (FL) is an emerging decentralized machine learning paradigm that enables model training without relying on a central server. Although some BFL frameworks are considered privacy-preserving, they are still vulnerable to various attacks, including inference and model poisoning. Additionally, most of these solutions...
The integration of Internet of Things (IoT) technology in various domains has led to operational advancements, but it has also introduced new vulnerabilities to cybersecurity threats, as evidenced by recent widespread cyberattacks on IoT devices. Intrusion detection systems are often reactive, triggered by specific patterns or anomalies observed wi...
The Internet of Vehicles (IoV) is a crucial technology for Intelligent Transportation Systems (ITS) that integrates vehicles with the Internet and other entities. The emergence of 5 G and the forthcoming 6 G networks presents an enormous potential to transform the IoV by enabling ultra-reliable, low-latency, and high-bandwidth communications. Never...
In recent years, numerous large-scale cyberattacks have exploited Internet of Things (IoT) devices, a phenomenon that is expected to escalate with the continuing proliferation of IoT technology. Despite considerable efforts in attack detection, intrusion detection systems remain mostly reactive, responding to specific patterns or observed anomalies...
The introduction of 6G technology into the Internet of Vehicles (IoV) promises to revolutionize connectivity with ultra-high data rates and seamless network coverage. However, this technological leap also brings significant challenges, particularly for the dynamic and diverse IoV landscape, which must meet the rigorous reliability and security requ...
In the rapidly evolving landscape of cyber threats targeting the Internet of Things (IoT) ecosystem, and in light of the surge in botnet-driven Distributed Denial of Service (DDoS) and brute force attacks, this study focuses on the early detection of IoT bots. It specifically addresses the detection of stealth bot communication that precedes and or...
Intrusion Detection Systems (IDS) play a crucial role in ensuring the security of computer networks. Machine learning has emerged as a popular approach for intrusion detection due to its ability to analyze and detect patterns in large volumes of data. However, current ML-based IDS solutions often struggle to keep pace with the ever-changing nature...
The Internet of Vehicles (IoV) is a crucial technology for Intelligent Transportation Systems (ITS) that integrates vehicles with the Internet and other entities. The emergence of 5G and the forthcoming 6G networks presents an enormous potential to transform the IoV by enabling ultra-reliable, low-latency, and high-bandwidth communications. Neverth...
Deploying Connected and Automated Vehicles (CAVs) on top of 5G and Beyond networks (5GB) makes them vulnerable to increasing vectors of security and privacy attacks. In this context, a wide range of advanced machine/deep learning based solutions have been designed to accurately detect security attacks. Specifically, supervised learning techniques h...
The Advanced Metering Infrastructure (AMI) is one of the key components of the smart grid. It provides interactive services for managing billing and electricity consumption, but it also introduces new vectors for cyberattacks. Although, the devastating and severe impact of power overloading cyberattacks on smart grid AMI, few researches in the lite...
Current flow-based Network Intrusion Detection Systems (NIDSs) have the drawback of detecting attacks only once the flow has ended, resulting in potential delays in attack detection and increasing the risk of damage due to the infiltration of a greater number of malicious packets. Moreover, the delay provides attackers with an extended period of pr...
One of the main features of data plane programmability is that it allows the easy deployment of a programmable network traffic management framework. One can build an early-stage Internet traffic classifier to facilitate effective Quality of Service (QoS) provisioning. However, maintaining accuracy and efficiency (i.e., processing delay/pipeline lat...
Community detection is a tool to understand how networks are organised. Ranging from social, technological, information or biological networks, many real-world networks exhibit a community structure. Consensual community detection fixes some of the issues of classical community detection like non-determinism. This is often done through what is call...
5G Vehicle-to-Everything (5G-V2X) communications will play a vital role in the development of the automotive industry. Indeed and thanks to the Network Slicing (NS) concept of 5G and beyond networks (B5G), unprecedented new vehicular use-cases can be supported on top of the same physical network. NS promises to enable the sharing of common network...
Next-generation mobile networks, namely 5G and beyond, have received significant interest from the research community. This is due to their potential in enabling innovative services and delivering unparalleled performance. To meet these expectations, Mobile Network Operators (MNOs) are investing in cloud native technologies to enhance the reliabili...
Optimizing Building energy consumption is a key solution to reducing their environmental impact. In this context, Information Technology can be harnessed by deploying sensors inside buildings, to collect relevant data about both energy consumed and occupant behavior, since occupants influence building appliances, such as HVAC, lights, and hot water...
Vehicular Fog Computing exploits the computing , caching and communication resources at vehicles to facilitate different location-based applications in a smart urban environment. Today, consumer vehicles can discover and consume available services from nearby vehicles, acting as provider vehicles in a fog network. However, it is challenging for the...
Edge Computing (EC) is a promising concept to overcome some obstacles of traditional cloud data centers to support Internet of Things (IoT) applications, especially time-sensitive applications. However, EC faces some challenges, including the resource allocation for heterogeneous applications at a network edge composed of distributed and resource-r...
Network slicing is a key component of the envisioned 5G network. Slices are virtual networks purpose-built for tenants using a shared infrastructure. The slicing process is
mathematically known as a virtual network embedding problem (VNE). Despite the plethora of VNE strategies in the literature, they do not take into account the fact that massive...
Edge computing enables a wide variety of application services for the Internet of Things, including those with performance-critical requirements. To achieve this, it brings cloud computing capabilities to network edges. A key challenge therein is to decide where and when to place or migrate application services considering their load variation and...
Edge computing enables a wide variety of application services for the Internet of Things, including those with performance-critical requirements. To achieve this, it brings cloud computing capabilities to network edges. A key challenge therein is to decide where and when to place or migrate application services considering their load variation and...
Cloud-based storage services have been the dominating outsourcing solution for both individuals and organizations to share data digitally. Despite the advantages, users must rely on storage services for data confidentiality, data access control, user privacy, and data availability. Whereas data confidentiality can be protected by advanced encryptio...
Apart from the the increasing demand of smartphones in human-to-human (H2H) communications, the introduction of machine-to-machine (M2M) devices poses significant challenges to wireless cellular networks. In order to offer the ability to connect billion of devices to propel the society into a new era of connectivity in our homes, officies and smart...
The Advanced Metering Infrastructure (AMI) is one of the key components of the smart grid. It provides interactive services for managing billing and electricity consumption, but it also introduces new vectors for cyberattacks. Although, the devastating and severe impact of power overloading cyberattacks on smart grid AMI, few researches in the lite...
Edge Computing emerges as a solution that overcomes
some obstacles of traditional central data centers to
support the performance-critical Internet of Things applications.
However, a challenge therein is the resource allocation for heterogeneous
applications at a network edge composed of distributed
and resource-restricted nodes. In this paper, we...
It is a widely accepted heuristic in content caching to place the most popular content at the nodes that are the best connected. The other common heuristic is somewhat contradictory, as it places the most popular content at the edge, at the caching nodes nearest the users. We contend that neither policy is best suited for caching content in a netwo...
Current mobile network infrastructure has a hard time keeping up with the constant content demand by an increasing number of smart devices, in terms of both bandwidth and cost. At the same time, the advent of devices with relatively high resources (computing, communications, caching) allows offloading computation, control, cache, and communication...
The growth in mobile devices results in constant generation and consumption of a large amount of data by mobile users on the go which is unbearable by the current mobile networks in terms of cost and bandwidth. At the same time, the technological advancements in modern vehicles allow us to harness their computing, caching, and communication capabil...
In cloud-based storage services, Ciphertext-Policy Attribute Based Encryption (CP-ABE) has been emerging as a promising outsourcing solution to provide data confidentiality protection and fine-grained data access management without relying on the Cloud. CP-ABE schemes enable data owner to encrypt data under a desired access structure before outsour...
Vehicular cloud (VC) is a promising environment, where intelligent transport applications can be developed relying on mobile vehicles, which can be both cloud users and cloud service providers. It enables vehicles that have sufficient resources to act as mobile cloud servers by offering a variety of services to users' vehicles. In this context, to...
There is an increasing user demand for high-quality content-rich multimedia services. Despite their advantages, current wireless networks in general and wireless mesh networks in particular have limitations in terms of quality of service (QoS) provisioning, especially when dealing with increased amounts of time sensitive traffic such as video. This...
Edge computing is a promising concept to enable the Internet of Things (IoT) vision, especially for supporting timesensitive applications. A challenge in this topic is the service placement problem, which concerns the decision of where to place multiple applications according to their Quality of Service (QoS) requirements on the one hand and the co...
Building energy consumption depends on many factors, such as occupant behavior and occupancy. Many works study building occupancy modeling and its impact on energy consumption, based on sensors, such as CO2, humidity, presence, etc., which are deployed within buildings and their surrounding areas. These sensors collect different types of data at a...
All Information-Centric Networking (ICN) architectures proposed to date aim at connecting users to content directly, rather than connecting clients to servers. Surprisingly, however, although content caching is an integral of any information-Centric Network, limited work has been reported on information-centric management of caches in the context o...
Participatory-sensing systems leverage mobile phones to offer unprecedented services that improve users' quality of life. However, the data collection process may compromise participants' privacy when reporting measurements tagged or correlated with their sensitive information. Therefore, existing privacy-preserving techniques introduce data pertur...
In mobile crowdsensing, users have a central role providing sensed data using their portable devices. Mobile crowdsensing applications have become quite popular nowadays. However, these applications can be bandwidth eager, big battery drainers, and may demand intensive network usage, which could exceed the allowance of users' mobile data plan. All...
Vehicular Cloud (VC) is a promising paradigm in which mobile vehicles can be both cloud users and service providers. It enables vehicles that have sufficient resources to act as mobile cloud servers by offering a wide range of services to user's vehicles. However, user vehicles need to discover provider vehicles along with their services, and reque...
Flexible querying exploits user preferences as pieces of information that help rank a set of alternatives from the most to the least satisfactory, based on the degrees of satisfaction of the criteria, describing the alternatives, to user preferences expressed by a user. Quantitative approaches for user preference evaluation and evaluation can perfo...
Smart buildings are aimed at monitoring and controlling building facilities through a Building Management System (BMS). While current BMSs are based on processing logs of devices deployed in the building, this paper enables supervision and control of building by the use of semantic technologies. A common information base, as a core data model, is d...
Wireless charging brings forward several new challenges in designing energy efficient wireless sensor networks. In a wireless charging scenario, a number of chargers with high energy resources are placed in the network to recharge power constrained nodes. Nevertheless, due to the fading effect of the signals, a few only nodes can remarkably benefit...
Information-centric networks enables a multitude of nodes, in particular near the end-users, to provide storage and communication. At the edge, nodes can connect with each other directly to get content locally whenever possible. As the topology of the network directly influences the nodes' connectivity, there has been some work to compute the graph...
Since Wireless Sensor Networks (WSNs) consist of nodes with limited power resources, methods that extend their energy lifespan are always in the spotlight. A potential method is the use of RF-power harvesting antennas which can absorb energy from radio frequency (RF) signals and transform a part of it into electricity. Dedicated energy transmitters...
In this paper, we focus on collecting data and detecting anomalies in Wireless Sensor Networks (WSNs) while optimizing the use of sensor computational and energetic resources. Recently, Compressive Sensing (CS)-based solutions had been the subject of extensive studies for the design of efficient data gathering solutions in WSNs. However, existing C...
The Wireless sensor networks (WSNs) become more and more recognized these recent years and their applications spread in several domains. In general, these applications require that the network presents a minimum degree of reliability, effectiveness and robustness. However, the specificity of the nodes used in this type of networks makes them prone...
Participatory Sensing (PS) systems rely essentially on users’ willingness to dedicate their devices’ resources (energy, processing time..) to contribute high-quality data about various phenomena. In this paper, we study the critical issue of participants’ recruitment in PS systems in the aim of minimizing the overall sensing time. First, we design...
Mobile users in an urban environment access con- tent on the internet from different locations. It is challenging for the current service providers to cope with the increasing content demand from a large number of collocated mobile users. In-network caching to offload content at nodes closer to users alleviate the issue, though efficient cache mana...
Wireless sensor networks (WSNs) are widely used in various domains. However, the specificity of the nodes deployed in these networks makes them prone to failures. To overcome this problem and guarantee the continuity of the network functioning in the presence of node failures, fault tolerance mechanisms need to be designed and integrated to ensure...
Mobile users in an urban environment access content on the internet from different locations. It is challenging for the current service providers to cope with the increasing content demand from a large number of collocated mobile users. In-network caching to offload content at nodes closer to users alleviate the issue, though efficient cache manage...
Information-Centric Fog Computing enables a multitude of nodes near the end-users to provide storage, communication , and computing, rather than in the cloud. In a fog network, nodes connect with each other directly to get content locally whenever possible. As the topology of the network directly influences the nodes' connectivity, there has been s...
Facilitating the creation of applications for the Internet of Things (IoT) is a major concern to increase its development. D-LITe, our previous work, introduces genericity by providing a universal programming interface. Objects are dynamically configured to have their own behaviour, and their actions/reactions are considered as part of a whole appl...
Information-Centric Fog Computing enables a multitude of nodes near the end-users to provide storage, communication, and computing, rather than in the cloud. In a fog network, nodes connect with each other directly to get content locally whenever possible. As the topology of the network directly influences the nodes' connectivity, there has been so...
Identity federations simplify user’s access control across different networks, domains or systems. These federations allow users to seamlessly access data from another domain and they avoid the need of a completely redundant user administration. Federations rely on Identity Providers (IdPs) to manage user’s identities. However, IdPs are prone to Di...
Wireless sensor networks (WSNs) are widely used in various domains. In general, the applications, in which the WSN is deployed, require that this network presents a minimum degree of reliability, effectiveness and robustness. However, the specificity of the nodes deployed in this kind of networks makes them prone to failures. One of the important p...
In this work, we present a complete architecture for designing Internet of Things applications. While a main issue in this domain is the heterogeneity of Objects hardware, networks and protocols, we propose D-LITe, a solution to hide this wide range of low layer technologies. By abstracting the hardware, we focus on object's features and not on its...