Jalel Ben Othman's research while affiliated with Université Paris-Saclay and other places

Publications (71)

Article
Full-text available
In this study, a secure and coordinated blockchain based energy trading system for Electric Vehicles (EVs) is presented. The major goals of this study are to provide secure and efficient energy trading between EVs and Charging Stations (CSs), and to ensure efficient coordination between EVs. In this study, a consortium blockchain based energy tradi...
Article
Full-text available
Traffic congestion is one of the biggest challenges around the world, resulting in multiple harmful consequences such as air pollution, road fatalities, and traffic jams. Thus, it is a vital need to develop preventive mechanisms that allow better traffic management and alleviate the burden put on the transport network. Vehicle-to-anything (V2X) com...
Conference Paper
The last decade has witnessed an ever-growing user demand for a better QoS (Quality Of Service) and the fast growth of connected devices still put high pressure on the legacy network infrastructures. To improve network performances, better manage the resources and have a greater control over traffic transmission, intelligent routing procedures are...
Preprint
Full-text available
The last decade has witnessed an ever-growing user demand for a better QoS (Quality Of Service) and the fast growth of connected devices still put high pressure on the legacy network infrastructures. To improve network performances, better manage the resources and have a greater control over traffic transmission, intelligent routing procedures are...
Article
With the steadily growing traffic demand, urban traffic congestion is becoming a critical issue threatening several factors, including public safety, emissions of greenhouse gas, and transport inefficiencies. Thus, intelligent transport systems (ITS) have emerged as a promising solution to easing the burden of congestion. ITS rely on different tech...
Article
Full-text available
Recently, Internet has evolved into a new generation, called Internet of Things, thus enabling the connection between the physical and the digital worlds by creating an ubiquitous and self-organizing network. A huge number of smart objects are becoming now identifiable and addressable while being able to communicate with each other. Moreover, the i...
Article
In this paper, a blockchained Beyond Fifth Generation (B5G) enabled malicious node detection model is proposed for the Internet of Sensor Things (IoSTs). Moreover, a secure service provisioning scheme using cascading encryption and feature evaluation process is also proposed for the IoSTs. The presence of malicious nodes causes severe issues in the...
Conference Paper
In this paper, a blockchain based scheme is proposed to provide registration, mutual authentication and data sharing in wireless sensor network. The proposed model consists of three types of nodes: coordinators, cluster heads and sensor nodes. A consortium blockchain is deployed on coordinator nodes. The smart contracts execute on coordinators to r...
Article
Full-text available
Non‐orthogonal multiple access (NOMA) has been investigated as a promising multiple radio access technology for future wireless networks to enable massive connectivity and improve spectral efficiency (SE). Furthermore, energy efficiency (EE) is becoming a primary concern and an inevitable trend for future wireless networks. For this, recent works h...
Article
Mobile Edge Computing (MEC) is promising for computation-intensive applications (such as automatic and cooperative driving) and storage burdens (video caching) on the Internet of Vehicles (IoV). It paves the way for the establishment of intelligent transportation systems and smart cities. Many countries all over the world have devoted themselves to...
Article
Full-text available
In recent years, building business applications from independently developed services has become one of the current trends in service computing. To satisfy clients’ requirements, service composition is performed to compose the various capabilities of available services. With the proliferation of services having similar functionalities, assessing th...
Book
This book constitutes the refereed proceedings of the 7th International Symposium on Ubiquitous Networking, UNet 2021, held in May 2021. Due to COVID-19 pandemic the conference was held virtually. The 16 revised full papers presented together with 6 invited papers and 3 special sessions were carefully reviewed and selected from 38 submissions. The...
Conference Paper
Full-text available
Nowadays, securing borders is becoming a real concern for all the countries over the world. Conventional methods which were widely used are quickly abandoned due to the intensive human involvement and high maintenance costs. Instead, new technologies, such as Wireless Sensor Networks (WSN), camera sensors and Unmanned Aerial Vehicles (UAVs) are dep...
Article
Full-text available
Small cells is a promising technique to increase the spectral efficiency or quality-of-service (QoS) of a cellular network as it reduces the distance between the user and the base station (MBS). It has been proposed for indoor as well as outdoor users. For the outdoor scenario, the backhaul (the link from a small cell to the core network) of the sm...
Article
Full-text available
IoT has the potential to transform the way we think about information and communication technology. IoT has been studied extensively across many disciplines such as the networking, communication , security, business, and management communities. However, many unsolved challenges , especially in managing heterogeneous IoTs, remain to be discussed. Re...
Conference Paper
Full-text available
Securing physical borders is a critical task and a real concern for all the countries over the world. Conventional techniques which have been largely investigated to secure borders over the past, are progressively abandoned due to the intensive human involvement and high maintenance costs. Recently, new technologies, such as Wireless Sensor Network...
Article
Full-text available
Underwater sensor networks (UWSNs) are instructed for critical applications like military surveillance and underwater oil spills that conducted in a very massive three‐dimensional (3‐D) space that needs many underwater nodes (UNs) to cover the target area. Those UNs are not easy to recharge and cannot exploit solar power. MAC protocols deployed for...
Article
With the acceleration in mobile broadband, wireless infrastructure plays a significant role in Internet-of-Things (IoT) to ensure ubiquitous connectivity in mobile environment, making mobile IoT (mIoT) as center of attraction. Usually intelligent systems are accomplished through mIoT which demands for the increased data traffic. To meet the ever-in...
Conference Paper
Full-text available
Mobile cellular users traveling in city buses are experiencing poor quality of signals due to the interference and the large number of mobile devices. To enhance the Quality-of-Service (QoS), deployment of small cell networks in city buses is a promising solution. The deployment of small cells in vehicular environment makes the resource allocation...
Article
Full-text available
Since a long time, the integrity of physical borders is seen as a challenging concern. Indeed, governments have to facilitate travelling and trade so that economies continue to grow while preventing the entry of dangerous entities. To this aim, several conventional techniques were enforced to secure borders in the recent past. However, due to the i...
Article
Full-text available
Nowadays, the energy efficiency in wireless sensor networks (WSN) has become a challenging issue. Indeed, due to the sustainable development and deployment of such networks in our daily lives, energy efficiency is asked lto be significantly improved in order to achieve green networking. Greedy behaviours are one of the most malicious and insidious...
Conference Paper
In this paper, we propose a new version of the LBRW (Learning based Random Walk), LBRW-Co, for predicting users co-occurrence based on mobility homophily and social links. More precisely, we analyze and mine jointly spatio-temporal and social features with the aim to predict and rank users co-occurrences. Experiments are performed on the Foursquare...
Conference Paper
The wireless shared medium used by Wireless Sensor Networks applications causes a problem related to interference, specially with dense deployment that characterises the WSNs. This requires the use of congestion control scheme to avoid interferences and buffer overflow that degrade the application reliability. REFIACC (Reliable, Efficient, fair and...
Conference Paper
Full-text available
With the diversity of services and the need of different traffic classes in wireless networks, WIMAX technology (Worldwide Interoperability for Microwave Access), has been developed as a broadband wireless access technology based on IEEE standard 802.16. Indeed, this technology is able to mix real time and non real time services with the definition...
Article
Wireless Sensor Networks (WSN) applications become more and more attractive with the miniaturisation of circuits and the large variety of sensors. The different application domains, especially critical fields of WSN use, make the reliability of data acquisition and communication a hot research field that must be tackled efficiently. Indeed, the qua...
Article
Full-text available
With the advent of new technologies in the area of wireless systems and communications, modern distributed systems are subject to new constraints. Indeed, there is an increasing need to develop ad hoc distributed applications. However, the latter are now subject to new type of failures with more frequency. Therefore, fault tolerance is a crucial pr...
Conference Paper
Abstract--In this paper, we present the Enhanced Learning Based Random Walk (ELBRW) recommender system for Places of Interest (POI)1, which leverages contextual information for providing more relevant POI recommendations. The ELBRW considers a model of contextual factors namely POI crowdedness based on a discrete-time Markov chain and combines user...
Article
Wireless Sensor Networks (WSN) utilisation is characterized by its dense deployment in order to fulfil the monitoring tasks. This density of communication leads to interference and congestion. In a previous work, a schedule scheme dubbed REFIACC (Reliable, Efficient, Fair and Interference Aware Congestion Control), that takes into account interfere...
Article
Full-text available
Vehicular Ad hoc Networks (VANETs), whose main objective is to provide road safety and enhance the driving conditions, are exposed to several kinds of attacks such as Denial of Service (DoS) attacks which affect the availability of the underlying services for legitimate users. We focus especially on the greedy behavior which has been extensively ad...
Conference Paper
—Failure detection in distributed systems under MANET environment is a hard task to achieve. Indeed, due to mobility and resource constraints, traditional protocols record a high number of false suspicions. We propose in this paper a new failure detection protocol for MANETs that achieves a better compromise in terms of accuracy and completeness, b...
Article
Full-text available
Wearable computing is becoming a more and more attracting field in the last years thanks to the miniaturisation of electronic devices. Wearable healthcare monitoring systems (WHMS) as an important client of wearable computing technology has gained a lot. Indeed, the wearable sensors and their surrounding healthcare applications bring a lot of benef...
Conference Paper
Full-text available
In this paper, we deal with failure detection in distributed systems under mobile environment constraints. For this effect, we propose a new protocol, called AFDAN (Accurate Fault Detection Protocol for Ad hoc Network), that is in charge of monitoring the distributed application against any node failure. The simulation results of our protocol show...
Article
Full-text available
Composite Web service architectures are demanding much guarantee on the Quality of Service (QoS) in order to meet user requirements. Performance evaluation of these architectures has become therefore a very challenging issue, as the task is very complex due to synchronization inside the orchestration of services. We propose in this paper to use sto...
Article
Full-text available
Event based applications of Wireless Sensor Networks (WSNs) are prone to traffic congestion, where unpredicted event detection yields simultaneous generation of traffic at spatially co-related nodes, and its propagation towards the sink. This results in loss of information and waste energy. Early congestion detection is thus of high importance in s...
Article
Full-text available
This paper deals with congestion and interference control in wireless sensor networks (WSN), which is essential for improving the throughput and saving the scarce energy in networks where nodes have different capacities and traffic patterns. A scheme called IACC (Interference-Aware Congestion Control) is proposed. It allows maximizing link capacity...
Conference Paper
Full-text available
On a major security issue in WSN is the availability as these networks suffer from Denial of service Attacks. One of the most aggressive DoS attacks in WSN are greedy behaviors. This attack consists in increasing the bandwidth by a compromised node at the expenses of other nodes by not respecting the access network procedure. In this paper, we tack...
Article
In recent years, wireless and mobile communication systems have become increasingly popular as the advance of hardware technologies makes the implementation of novel communication technologies feasible. With growing demand of software downloading and mobile multimedia services, the quality of service (QoS) provisioning and the management of network...
Article
Full-text available
In WiMAX networks, contention based bandwidth requests are allowed in the uplink channel on the time division duplexing frame. The standard allows some types of traffic classes to use this period while preventing others like Unsolicited Grant Service. In this study, we provide a performance analysis of the three types of connections (ertPS, non-rea...
Conference Paper
Vehicular ad hoc network (VANET) is currently researched and achieved by several organizers to develop the intelligent transportation system (ITS). Research on Vehicular Ad hoc Network (VANET) has been conducting for long time. Nowadays, several organizers has obtained remarkable achievements contributing to the development of the Intelligent trans...
Conference Paper
Clustering algorithms play an important role in design and deployment of in wireless sensor networks (WSNs). We apply here a general clustering algorithm namely FFUCA (Fast and Flexible Unsupervised Clustering Algorithm) on WSNs. This application shows that FFUCA provides rapidly a strong organizational structure of nodes. We compare its built stru...
Article
An ad hoc network is a self-organizing network of wireless links connecting mobile nodes. The mobile nodes can communicate without an infrastructure. They form an arbitrary topology, where the nodes play the role of routers and are free to move randomly.Ad hoc networks proved their efficiency being used in different fields but they are highly vulne...
Article
In wireless networks, the radio link vulnerability attributed to effects such as noise, interference, free-space loss, shadowing and multipath fading, must be considered. MAC protocols developed for these networks do not take into account these perturbations. It was shown, in the literature, that 802.11 suffers from what is called 'the 802.11 anoma...
Article
WiMAX (Worldwide Interpretability for Microwave Access) is one of the leader standards of broadband Wireless Access (BWA). This standard becomes a competitor of 4G or LTE (Long Terme Evolution) with the introduction of different class of service flow (UGS, rtPS, nrtPS, BE). Each service class has its own QoS requirements. Even if the standard speci...
Conference Paper
Full-text available
The emergence and success of IP networks make the development of new services like voice, multimedia or web services possible. One of the major problem of these type of application is that IP networks is not designed to provide Quality of Service (QoS) in an end to end architecture. Thus the performance evaluation of these applications is important...
Conference Paper
In this paper, we propose a new scheme to detect misbehaving nodes that violate their contracted bit rate in the context of wireless ad-hoc networks. To achieve this, we use our DCF-MB access policy instead of the well known DCF protocol. The DCF-MB approach ensures a fair time occupancy of the shared channel among competing nodes. Using our DCF- M...
Conference Paper
Full-text available
Due to its increasingly growing capacity, WLANs are becoming mature enough to be integrated in a real commercial multi-service offers. However, their success will mainly depend on their ability to provide quality of service for different media types (audio, video, etc.). In this paper, we devise a new protocol which provides a more strict service d...
Conference Paper
Full-text available
In this paper, we propose a new solution to cope with the unfairness limitations of the distributed coordination function (DCF) algorithm. Our solution is based on multiple backoff windows principle. We demonstrate through simulations the efficiency of our proposal that enables fair bandwidth sharing and increase total network throughput.
Article
Après deux générations de réseaux mobiles qui ont permis de faire une extention du réseaux téléphonique sur la partie radio offrant la possibilté à l'utilisateur d'être mobile, la troisième génération offre en plus la possibilité d'intégrer plusieurs types de service comme la voix, les données ou le multimédia. Chaque type de service considéré dans...
Article
Full-text available
In this paper, we propose a new solution to cope with the unfairness limitations of the Distributed Coordination Function (DCF) algorithm. Indeed, in current widely deployed IEEE 802.11b wireless local area networks (WLAN), the performance of all the competing access nodes are dramatically affected once the bit rate of one station degrades. This an...
Article
In this study we propose a new architecture named VIP (VHE in mobile IP networks) which guarantees authorized user access and user mobility management. The main goal is to bring the VIP architecture closer to the current GSM networks. To achieve this goal our architecture is based on LDAP and RADIUS services. VIP is able to ensure user’s mobility a...
Conference Paper
In this study we propose a new architecture named VIP (VHE in mobile IP networks) which guarantees authorized user access and user mobility management. The main goal is to bring the VIP architecture closer to the current GSM networks. To achieve this goal our architecture is based on LDAP and RADIUS services. VIP is able to ensure user's mobility a...
Article
Full-text available
The modeling of mobile networks is difficult because of the number of users and their mobilities. In this study, we present a new methodology based upon stochastic ordering of Markov chains in order to evaluate the performance measures in wireless networks. These kind of networks are based on cellular systems. The cellular systems use different fre...
Conference Paper
TCP is a protocol which performs well with networks that are physically linked and hosts are stationary. However, TCP/IP protocols work independently of the physical layer. In wireless environments, mobile hosts are subject to change their attachment point during communication. When a user moves towards a new network domain during communication, th...
Conference Paper
Summary form only given. Due to random access in wireless networks using CSMA/CA like in Wifi networks, the integration of services with a lot of quality of service needs is impossible. In this paper, we propose to study and to evaluate a new MAC protocol that takes into account different types of traffic (e.g.. voice and data) and for each traffic...
Conference Paper
Summary form only given. VHE (virtual home environment) poses new challenges in terms of services customization and the integration of end-to-end QoS management. Our approach provides a model for the mobility management in IPv6 according to VHE context. In this paper we introduce an architecture which guarantees authorized user access and user mobi...
Conference Paper
The original 802.11 media access control protocol was designed with two simple access functions: DCF (distributed coordination function) which does not support any type of priority access and PCF (point coordination function) which supports time sensitive traffic flows but does not differentiate between traffic types. Enhancements that IEEE propose...
Conference Paper
Mobility management is an important topic in wireless networks. Mobile hosts are subject to changing their point of attachment from his home network to another foreign network. In terms of personalized services, the network manager must know the user location by implementing a roaming mechanism. VHE (virtual home environment) provides to the users...
Conference Paper
The fourth generation has been based on the development of the Internet in the air interface. The current Internet lacks the quality of service support. A previous contribution proposed the development of a new protocol (MIR: mobile IP reservation protocol), which provides quality of service guarantees to a mobile terminal [J. Benothman et al., 200...

Citations

... The problem of network connectivity has been studied extensively in terms of varying effective factors such as mobility, speed, density, and other parameters. This includes studies based on one-dimensional, multi-lane and square grids scenarios, probability theory-based models, Markov Chain based models, graph theory-based models and so on [24][25][26][27][28][29][30][31][32]. All these studies prove that the connectivity problem in VANETs is still a challenging problem that depends on different perspectives of both vehicular traffic and networking settings, and therefore this encouraged us to think about the need for more realistic mobility models as the main entry to analyze network connectivity dynamics. ...
... Such a technological feature enables communication through heterogeneous networks, for the purpose of collecting, storing and processing data. This resulted in a quick appearance of multiple kinds of smart connected devices in almost every area, from the industrial sector known as the Industrial Internet of Things (IIoT) to transportation and all the way to smart homes, to build our future smart cities [2]. It is expected that, in a mid term, smart connected devices will be more integrated in each aspect of people's every day's life, not only because those devices are becoming cheaper and more accessible to a large number of persons worldwide, but also because individuals are becoming more aware of the potential of this technology in making their day-to-day tasks easier to complete in the most efficient possible way. ...