Publications

Hedjazi D, Layachi F, Boubiche DE. A multi-agent system for distributed maintenance scheduling. Computers & Electrical Engineering. 2019;77 :1-11.Abstract

Due to the intrinsically geo-distributed subcontracting maintenance activity practice, the maintenance scheduling has for a long time been a major challenge in the industry. This research work presents a methodology to schedule the maintenance activities of geo-distributed assets. A multi-agent system based approach is proposed to enable the decision-making for the subcontractors in a distributed industrial environment under uncertainty. An auction based negotiation mechanism is designed to promote competition and cooperation among the different agents, and to obtain global good schedule.Compared to the Weighted Shortest Processing Time first–Heuristic–Earliest Due Date (WSPT-H-EDD) method, the experimental results show that the proposed approach is able to provide scheduling scheme with good performances in terms of Global Cost, Total Weighted Tardiness Cost and makespan.

Athmani S, Bilami A, Boubiche DE. EDAK: An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs. Future Generation Computer Systems. 2019;92 :789-799.Abstract

Securing the network communication represents one of the most important challenges in wireless sensor networks. The key distribution problem has been widely discussed in classical wireless sensor networks contrarily to heterogeneous ones. HWSNs (Heterogeneous Wireless Sensor Networks) have optimized the network capability and opened new security opportunities by introducing high resource capacity sensor nodes in the network. In this paper, an efficient dynamic authentication and key Management scheme is proposed for heterogeneous WSN. The main idea is to provide a single lightweight protocol for both authentication and key establishment while optimizing the security level. The key distribution algorithm is based on preexisting information to generate dynamic keys and does not require any secure channel and sharing phase which improves the security, energy efficiency and reduces the memory consumption. Experimental results have confirmed the performances of our mechanism compared to some of the existing security protocols.

Benayache A, Bilami A, Barkat S, Lorenz P, Taleb H. MsM: A microservice middleware for smart WSN-based IoT application. Journal of Network and Computer Applications. 2019;144 :138-154.Abstract

Actually, wireless sensor networks represent a substantial part in IoT. However, their limitation requires a special consideration in IoT applications. For their integration with the internet, it is necessary to adapt such networks using different middleware, with taking into account various challenges such as heterogeneity and interoperability.

Previously Service Oriented Architecture (SOA) was the suitable design, but with a better practice, a new design called microservice becomes the leader due to its high performance and its suitability for IoT applications.

In this paper, we first survey the most important middleware that have been proposed to handle WSN through IoT. Also, we discuss the most crucial microservices that handle different integration factors by making them supported by the proposed middleware. Our proposal is inspired from artificial neural network architecture to allow dynamic service interaction; it supports unlimited services with a regard to various device capabilities separately of the cloud technologies. Moreover, the evaluation of our design clearly shows that our middleware allows a lightweight WSN integration with IoT regarding to their limitations and requirements.

Akleylek S, Soysaldı M, Boubiche DE, Toral-Cruz H. A Novel Method for Polar Form of Any Degree of Multivariate Polynomials with Applications in IoT. Sensors (Basel). 2019;19 (4) :903.Abstract

Identification schemes based on multivariate polynomials have been receiving attraction in different areas due to the quantum secure property. Identification is one of the most important elements for the IoT to achieve communication between objects, gather and share information with each other. Thus, identification schemes which are post-quantum secure are significant for Internet-of-Things (IoT) devices. Various polar forms of multivariate quadratic and cubic polynomial systems have been proposed for these identification schemes. There is a need to define polar form for multivariate dth degree polynomials, where d ≥ 4 . In this paper, we propose a solution to this need by defining constructions for multivariate polynomials of degree d ≥ 4 . We give a generic framework to construct the identification scheme for IoT and RFID applications. In addition, we compare identification schemes and curve-based cryptoGPS which is currently used in RFID applications.

Boubiche DE, Imran M, Maqsood A, Shoaib M. Mobile crowd sensing – Taxonomy, applications, challenges, and solutions. Computers in Human Behavior. 2019;101 :352-370.Abstract

Recently, mobile crowd sensing (MCS) is captivating growing attention because of their suitability for enormous range of new types of context-aware applications and services. This is attributed to the fact that modern smartphones are equipped with unprecedented sensing, computing, and communication capabilities that allow them to perform more complex tasks besides their inherent calling features. Despite a number of merits, MCS confronts new challenges due to network dynamics, the huge volume of data, sensing task coordination, and the user privacy problems. In this paper, a comprehensive review of MCS is presented. First, we highlight the distinguishing features and potential advantages of MCS compared to conventional sensor networks. Then, a taxonomy of MCS is devised based on sensing scale, level of user involvement and responsiveness, sampling rate, and underlying network infrastructure. Afterward, we categorize and classify prominent applications of MCS in environmental, infrastructure, social, and behavioral domains. The core architecture of MCS is also described. Finally, we describe the potential advantages, determine and reiterate the open research challenges of MCS and illustrate possible solutions.

Guezouli L, Barka K, Bouam S, Zidani A. A variant of random way point mobility model to improve routing in wireless sensor networks. International Journal of Information and Communication Technology. 2018;13 (4).Abstract

The mobility of nodes in a wireless sensor network is a factor affecting the quality of service offered by this network. We think that the mobility of the nodes presents an opportunity where the nodes move in an appropriate manner. Therefore, the routing algorithms can benefit from this opportunity. Studying a model of mobility and adapt it to ensure an optimal routing in an agitated network is the purpose of our work. We are interested in applying a variant of the mobility model RWP (named routing-random waypoint 'R-RWP') on the whole network in order to maximise the coverage radius of the base station (which will be fixed in our study) and thus to optimise the data delivery end-to-end delay.

Hedjazi D. Constructing collective competence: a new CSCW-based approach. International Journal of Information and Communication Technology. 2018;12 (3) :4.Abstract

Within the majority of contexts, it is persons that are considered to be competent or incompetent. However, in many cases it is the performance of groups and teams that is most important. This implies a concept of collective competence that integrates the set of skills in a group. In addition, the collective competence construction process is also enriched through collaboration which implies exchanges, confrontations, negotiations and interpersonal interactions. This paper presents our CSCW-based approach supporting collective competence construction. As a case of study, the industrial maintenance workspace is fundamentally a collaborative context. Our contribution in this area led us first, to analyse the related task in order to highlight collaborative maintenance vital needs and design the appropriate required group awareness supports which will be used to support collective competence. Finally, the experimentation study identifies the highly effective group awareness tools.

Sahraoui S, Sahraoui S, Benbousa O, Berkani A-S, Bilami A. Sensor-based wearable system for the detection and automatic treatment of nocturnal hypoglycaemia. Healthcare Technology Letters . 2018;5 (6) :239 - 241.Abstract

Diabetic patients are prone to daily and severe health-related risks, namely hyper and hypoglycaemia. Hypoglycaemia phenomenon happens when the glucose level in patient's blood is lower than a well-determined sill. It may induce serious impacts, such as functional brain failure or even the death. Hypoglycaemia is especially dangerous when it occurs during the night while the patient is asleep because it becomes difficult to be detected by the patient itself or other persons around him. While all existing sensor-based solutions are detection-only driven, the proposed solution goes beyond and attempts to treat autonomously, and at low cost, the nocturnal hypoglycaemia. The presented system detects the nocturnal hypoglycaemia phenomenon based on accelerated heart-rate symptom and a progressive detection algorithm. The system treats then the detected nocturnal hypoglycaemia throughout safe and automatic injection of glucagon.

Djebaili Y, Bilami A. A Cross-Layer Fault Tolerant Protocol with Recovery Mechanism for Clustered Sensor Networks. International Journal of Distributed Systems and Technologies (IJDST) . 2018;9 (1) :22.Abstract

This article describes how fault tolerance is an essential issue for many WSN (Wireless Sensor Network) applications such as wildlife monitoring, battlefield surveillance and health monitoring. It represents a great challenge for researchers regarding to the characteristics of sensor nodes which are prone to failures due essentially to their limited resources. Faults may occur, not only when sensor nodes exhaust their energy, but also when the congestion phenomenon emerges, because of a high traffic in the network and limited storage capacity of the sensor nodes. In order to support fault tolerance in WSNs, the authors propose a new scheme which incorporates a link quality estimation algorithm and a congestion detection mechanism to enable nodes that present high quality links to be chosen for routing in a non-congested area in case of faults. Evaluations through simulations under NS2 show that our proposed protocol tolerates faults with a minimum cost relatively to HEEP protocol and improves network's performances comparatively to other fault tolerant protocols such as EF-LEACH.

Beghriche A, Bilami A. A fuzzy trust-based routing model for mitigating the misbehaving nodes in mobile ad hoc networks. International Journal of Intelligent Computing and Cybernetics. 2018.Abstract

Security is one of the major challenges in the design and implementation of protocols for mobile ad hoc networks (MANETs). In such systems, the cooperation between nodes is one of the important principles being followed in the current research works to formulate various security protocols. Many existing works assume that mobile nodes will follow prescribed protocols without deviation. However, this is not always the case, because these networks are subjected to a variety of malicious attacks. Since there are various models of attack, trust routing scheme can guarantee security and trust of the network. The purpose of this paper is to propose a novel trusted routing model for mitigating attacks in MANETs.