October 2024
·
8 Reads
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
October 2024
·
8 Reads
September 2024
·
67 Reads
·
1 Citation
Telecommunication Systems
Network slicing is one 5G network enabler that may be used to enhance the requirements of mission-critical Machine Type Communications (mcMTC) in critical IoT applications. But, in applications with high mobility support, the network slicing will also be influenced by users’ movement, which is necessary to handle the dynamicity of the system, especially for critical slices that require fast and reliable delivery from End to End (E2E). To fulfill the desired service quality (QoS) of critical slices due to their users’ movement. This paper presents mobility awareness for such types of applications through mobility prediction, in which the network can determine which cell the user is in near real-time. Furthermore, the proposed next-cell mobility prediction framework is developed as a multi-classification task, where we exploited Long Short-Term Memory (LSTM) and the collected historical mobility profiles of moving users to allow more accurate short- and long-term predictions of the candidate next-cell. Then, within the scope of high mobility mission-critical use cases, we evaluate the effectiveness of the proposed LSTM classifier in vehicular networks. We have used a real vehicle mobility dataset that is obtained from SUMO deployed in Bejaia, Algeria urban environment. Ultimately, we conducted a set of experiments on the classifier using datasets with various history lengths, and the results have validated the effectiveness of the performed predictions on short-term mobility prediction. Our experiments show that the proposed classifier performs better on longer history datasets. While compared to traditional Machine Learning (ML) algorithms used for classification, the proposed LSTM model outperformed ML methods with the best accurate prediction results.
November 2022
·
54 Reads
October 2022
·
40 Reads
·
1 Citation
September 2022
·
122 Reads
·
3 Citations
Wireless Networks
Connected Vehicles (CVs) are the key enabling technology for Intelligent Transportation Systems (ITSs) that offer great opportunities for improving traffic safety and efficiency. They provide several innovative safety-related applications such as traffic management and monitoring, which involve the transmission of messages from all vehicles on the road. Basic Safety Messages (BSMs) constitute an essential type of control message. However, several critical issues affect the BSM messages’ reliability. In this paper, a model-based approach for detecting discordant BSMs is proposed, which allows to avoid the vehicle disturbance. This approach consists of detecting incoherence in communication metric values, where the detection is formulated as an anomaly detection problem that is solved using the Gaussian distribution. The detection process allows the vehicles to cross their prediction to achieve more precision in deciding whether to accept or reject a message from a vehicle. The efficiency of our model for detecting an anomaly has been evaluated through simulations using our generated dataset. The obtained results indicate that the proposed model provides high performance in terms of detection rate. Moreover, we evaluate and validate the proposed approach through formal evaluation, where it demonstrates promising performances, as compare it with a concurrent approach through simulations considering important metrics.
March 2022
·
153 Reads
·
7 Citations
Computing
The autonomous vehicles emergence is a significant step forward in the development of safe and dependable intelligent transportation systems. In vehicular automation, digital connectivity has been one of the most critical specifications. In this paper, we focus on the autonomous train, which is one of the most rapidly growing applications of autonomous vehicles. In this context, we address the issue of safety by the proposition of Enhanced Train-centric Communication-Based Train Control (ETcCBTC), which provides efficient control of rail traffic. To ensure the operation’s safety, we’ve implemented a new safety-checking approach based on process algebra, which aims to track and correct in real time the train behavior. The proposed ETcCBTC system’s performance is tested using extensive simulations and compared to CBTC and TcCBTC. In terms of checking success, transmission load, and response time, the obtained results demonstrate that ETcCBTC outperforms the concurrent systems.
October 2021
·
60 Reads
Wireless Personal Communications
The fast evolution in microelectronics and the emergence of wireless communication technologies, have allowed the appearance of the promising field of Internet of Things (IoT). The latter is more and more present in the human life, that is why it becomes essential to secure the communications done with the connected objects. Almost all communicating systems attach great importance to security, consequently, on the cryptographic key management. The existing key management schemes for conventional networks are relatively resource-intensive, that is why they are not adequate for resource-constrained networks like IoT, especially since the nodes’ capabilities are heterogeneous. In this paper, we focus on exchanging and updating of cryptographic keys among the IoT objects often limited in resources, where we propose a new form of key exchange based on the mechanism of concealing encryption keys, while exploiting the misused spaces in the header fields of the exchanged packets by the communication standards, such as ZigBee, BLE, WiFi.
June 2020
·
65 Reads
·
4 Citations
Wireless Personal Communications
The existing cryptographic key management mechanisms are implemented as independent modules, they generate their own messages which consumes considerable energy. The novelty of our approach is that it does not generate any specific message by dint of steganography. Indeed, the main contribution in SKMSI-CL is the concealment the key parts in the misused spaces in the packets headers of the ZigBee standard. We exploit the messages sent by the Cell-LEACH routing protocol in order to send the key parts. We set up several types of keys to support multiple types of communications and stay in step with the data aggregation paradigm. We formally analyze some of the security properties of our protocol. Finally, we validate our performance with simulations, the results show that the network lifetime and the overall remaining energy are largely better in our scheme.
December 2018
·
97 Reads
·
7 Citations
AEU - International Journal of Electronics and Communications
Mobile Wireless Sensor Network (MWSN) is a set of interconnected mobile sensor devices forming a dynamic network without a fixed administration. MWSN is used in various domains, such as disaster detection, medical systems, military applications, vehicular communications, and in other sensitive applications. Compared to the classical sensor networks, MWSNs involve an additional constraint consisting of the topology change frequency caused by the mobility of sensor devices. This influences highly the energy consumption and consequently the network reliability. In this paper, we take in charge this important issue and we contribute by the proposition of an efficient and energy-aware routing protocol. The proposed protocol operates for both request and event oriented MWSN applications. It introduces the sensor device mobility history in order to build-up stable routing paths, and incorporates a novel technique of dissimulation in order to exchange the mobility control messages without overhead. We have evaluated the performances of the proposed protocol through simulations, in which it provides effective results in terms of energy consumption and load-balancing.
January 2018
·
54 Reads
·
15 Citations
IET Wireless Sensor Systems
Key management is the basic building block of all the security protocols and is one of the most challenging issues in wireless sensor networks (WSNs). Centralising a trusted key management server is not an appropriate solution in such fully distributed networks. On the other hand, designing a distributed key management system is a challenging task, due to the constrained characteristics of sensor nodes, which are limited in storage, computation, communication, and energy. In the literature, there is a hot research effort on key management purpose for WSNs. The greatest part of the existing solutions focuses mainly on the optimisation of the key number, rekeying frequency and process or the encryption system of the distributed keys. Unfortunately, these systems are implemented as an additional and independent service, involving a considerable overhead. In this study, the authors propose μKMS (micro key management system) for WSNs. μKMS implements a dissimulation scheme, embedding the rekeying process messages on the unexploited coding space of the exchanged ZigBee packets. They have developed simulations, where the obtained results show the relevance of μKMS in terms of communication overhead, storage overhead, and energy consumption.
... The data-centric approach utilizes data generated inside the vehicle to detect abnormalities for self-recovery or transmits this data to the outside to determine whether an abnormality exists in an external system [1][2][3][4]. Image-based approaches identify vehicles through image-processing technology and detect abnormal behavior based on this [5][6][7][8][9]. ...
September 2022
Wireless Networks
... The architecture of the CBTC system is primarily comprised of three primary components and two secondary components. These include the VOBC, the ATS system, and the Zone Controller, as well as balises and Global Positioning System (GPS) [25]. Balises are positioned along the track to provide location information, while GPS provides additional location data that can be used to supplement the balise information to estimate with more precision the train's position. ...
March 2022
Computing
... The proposed solution build-up stable routing paths based on the sensor device mobility history and incorporates a novel technique of dissimulation to exchange mobility control messages without overhead to optimize energy consumption in the network. • In [20] AISSANI et al. the authors proposed KMSI-CL based on the possibility of node to node communication to allow ata aggregation and integrate the proposed key management protocol.The proposed solution is used to enhance energy conservation in the network. • In [21], HU et al. present two mode for rechargeable WSNs; the normal and low power mode. ...
June 2020
Wireless Personal Communications
... "Dissimulation Routing Protocol (DRP)" [24] is a load balancing protocol designed for mobility-enabled WSN. It intends to decrease the energy level consumed for delivering the packet. ...
December 2018
AEU - International Journal of Electronics and Communications
... The computational memory of the overall model is 140 kb, which is basically equal to the AGTM. When the network scale is 50 nodes, the transmission overhead is 50 kB, and the receiving overhead is 20 kB in [34]. The overall overhead is 560 kb. ...
January 2018
IET Wireless Sensor Systems