Publications

Guezouli L, Barka K, Bouam S, Zidani A. Implementation and Optimization of RWP Mobility Model in WSNs Under TOSSIM Simulator. International Journal of Commu9nication Networks and Information Security (IJCNIS). 2017;9 (1).Abstract

Mobility has always represented a complicated phenomenon in the network routing process. This complexity is mainly facilitated in the way that ensures reliable connections for efficient orientation of data. Many years ago, different studies were initiated basing on routing protocols dedicated to static environments in order to adapt them to the mobile environment. In the present work, we have a different vision of mobility that has many advantages due to its 'mobile' principle. Indeed, instead of searching to prevent mobility and testing for example to immobilize momentarily a mobile environment to provide routing task, we will exploit this mobility to improve routing. Based on that, we carried out a set of works to achieve this objective. For our first contribution, we found that the best way to make use of this mobility is to follow a mobility model. Many models have been proposed in the literature and employed as a data source in most studies. After a careful study, we focused on the Random Waypoint mobility model (RWP) in order to ensure routing in wireless networks. Our contribution involves a Random Waypoint model (in its basic version) that was achieved on the TOSSIM simulator, and it was considered as a platform for our second (and main) contribution, in which we suggested an approach based RWP where network nodes can collaborate and work together basing on our recommended algorithm. Such an approach offers many advantages to ensure routing in a dynamic environment. Finally, our contributions comprise innovative ideas for suggesting other solutions that will improve them.

Sedrati M, Taleb H. Evaluating QoS parameters for video streaming transmission in mobile ad hoc networks. International Journal of Autonomic Computing . 2017.Abstract

Recently, multimedia streaming applications are deployed anywhere (homes, campuses, etc.). Delivering these applications over mobile ad hoc networks is a challenging task: first, mobile ad hoc networks are infrastructure less, with dynamic topology, and limited resources. Secondly these applications have strict quality of service (QoS) requirements given with delay, jitter, bandwidth, loss rate, etc. Several architectures have been developed. However, an important part like QoS in routing level is still omitted. In this paper, many different coding techniques for video streaming are reviewed and two routing protocols (reactive and proactive) are used to evaluate which of them can improve QoS for multimedia streaming applications. Results show that reactive protocol performs better than proactive protocol in terms of throughput and network load in high mobility, but roles are reversed in terms of loss rate and network load for large-scale networks. PNSR and Jitter are influenced by nodes numbers independently of used protocol.

Bourmada A, Bilami A. Cross-layer energy efficient protocol for QoS provisioning in wireless sensor network. International Journal of Systems, Control and Communications. 2017;8 (3).Abstract

Ensuring (QoS) in wireless sensor networks (WSNs) is a challenging issue due to the lack of resources and energy exhausting of sensor nodes. In this paper we propose a new QoS aware routing protocol for multi-hop wireless sensor networks based on cross-layer interaction between the network, MAC and physical layers. At physical layer, a link quality estimator is studied for the purpose of evaluating link quality. At MAC layer, a differentiated services mechanism is used to distinguish between real time and non-real time packets and to allocate more channel resources for real time traffic; TDMA slots also have been modified to allocate more and earlier slots to real time packets. At network layer, a routing path selection algorithm is introduced for QoS optimisation. Simulation results show that our proposed protocol improves network's performances in terms of energy efficiency and QoS.

Barka K, Bilami A, Gourdache S. MONet: A framework for self-adaptive energy-aware middleware for dynamic wireless sensor network. International Journal of Pervasive Computing and Communications. 2017.Abstract

The purpose of this paper is to ensure power efficiency in wireless sensor networks (WSNs) through a new framework-oriented middleware, based on a biologically inspired mechanism that uses an evolutionary multi-objective optimization algorithm. The authors call this middleware framework multi-objective optimization for wireless sensor networks (MONet).

Naidja M, Bilami A. A dynamic self-organising heterogeneous routing protocol for clustered WSNs. International Journal of Wireless and Mobile Computing. 2017;12 (2).Abstract

Many self-adaptation routing schemes have been proposed for sensor networks. The most relevant of them consider a hierarchical topology and aim to meet energy conservation and QoS requirements in a homogeneous environment. In such networks, one specific algorithm is commonly applied by all nodes inside clusters. Contrarily, in this paper, we propose a heterogeneous routing by applying different strategies according to specific parameters at the same time inside different clusters. Moreover, each cluster can adopt different strategies at different moments under different conditions. This approach leads to a new self-adaptation protocol based on heterogeneity of the routing process in a multi-hop clustering WSN. The proposal uses a set of mechanisms that have been adopted in well-known protocols (HEEP, APTEEN, LEACH, PEGASIS, etc.) taking into account their strengths and weaknesses. Simulations under NS2 show that our proposal, based on heterogeneous routing protocol, prolongs the network lifetime with different ratios compared to HEEP, PEGASIS and others.

Sedrati M, Benyahia A. Multipath Routing to Improve Quality of Service for Video Streaming Over Mobile Ad Hoc Networks. Wireless Personal Communications. 2017;99 (2) :999–1013.Abstract

Providing quality of service (QoS) for real-time multimedia applications such as video streaming in mobile ad hoc networks (MANETs) is an important challenge. MANETs are characterized by lack of fixed infrastructure, dynamic topology, and limited resources that make more difficult multimedia applications transport and run on this networks. To overcome this challenge, video coding techniques combined to multiple routing paths (multipath) is a promising technique for supporting transmission of multiple video streams with appropriate QoS over mobile ad hoc networks. In this paper, firstly, many issues and different techniques for video streaming over MANET have been reviewed and secondly two multi paths routing protocols (M-AODV and MDSDV) have been evaluated in order to improve QoS for real-time multimedia applications. Results show that none of these two protocols is better than the other. In certain situations (throughput and load network with high mobility) is M-AODV but in others (network load and reliability for large-scale network) is MDSDV protocol which displays good performance. It is also noted that these two protocols provide between acceptable and good quality and a small jitter regardless of nodes number in medium mobility.

Hidoussi F, Toral-Cruz H, Boubiche DE, Martínez-Peláez R, Alvarado PV, Barbosa R, Freddy C. PEAL: Power Efficient and Adaptive LatencyHierarchical Routing Protocol for Cluster-Based WSN. Wireless Personal Communications . 2017;96 (7) :4929–4945.Abstract

In wireless sensor networks, one of the most important constraints is the low power consumption requirement. For that reason, several hierarchical or cluster-based routing methods have been proposed to provide an efficient way to save energy during communication. However, their main challenge is to have efficient mechanisms to achieve the trade-off between increasing the network lifetime and accomplishing acceptable transmission latency. In this paper, we propose a novel protocol for cluster-based wireless sensor networks called PEAL (Power Efficient and Adaptive Latency). Our simulation results show that PEAL can extend the network lifetime about 47% compared to the classic protocol LEACH (Low-Energy Adaptive Clustering Hierarchy) and introduces an acceptable transmission latency compared to the energy conservation gain.

Guezouli L, Azzouz I. ENHANCEMENT OF THE FUSION OF INCOMPATIBLE LISTS OF RESULTS. International Journal of Digital Information and Wireless Communications (IJDIWC) . 2016;6 (2) :78-86.Abstract

This work is located in the domain of distributed information retrieval (DIR). A simplified view of the DIR requires a multi-search in a set of collections, which forces the system to analyze results found in these collections, and merge results back before sending them to the user in a single list. Our work is to find a fusion method based on the relevance score of each result received from collections and the relevance of the local search engine of each collection, which is the main issue of our work.

Benhamouda S, Guezouli L. Selection of Relevant Servers in Distributed Information Retrieval System. International Journal of Computer and Information Engineering. 2016;10 (5).Abstract

Nowadays, the dissemination of information touches the distributed world, where selecting the relevant servers to a user request is an important problem in distributed information retrieval. During the last decade, several research studies on this issue have been launched to find optimal solutions and many approaches of collection selection have been proposed. In this paper, we propose a new collection selection approach that takes into consideration the number of documents in a collection that contains terms of the query and the weights of those terms in these documents. We tested our method and our studies show that this technique can compete with other state-of-the-art algorithms that we choose to test the performance of our approach.

Guezouli L, Essafi H. SEARCH OF INFORMATION BASED CONTENT IN SEMI-STRUCTURED DOCUMENTS USING INTERFERENCE WAVE. International Journal of Computational Science, Information Technology and Control Engineering . 2016;3 (3) :29-39.Abstract

This paper proposes a semi-structured information retrieval model based on a new method for calculation of similarity. We have developed CASISS (Calculation of Similarity of Semi-Structured documents) method to quantify how two given texts are similar. This new method identifies elements of semi-structured documents using elements descriptors. Each semi-structured document is pre-processed before the extraction of a set of descriptors for each element, which characterize the contents of elements.It can be used to increase the accuracy of the information retrieval process by taking into account not only the presence of query terms in the given document but also the topology (position continuity) of these terms.

Guezouli L, Essafi H. CAS-based information retrieval in semi-structured documents: CASISS model. Journal of Innovation in Digital Ecosystems. 2016;3 (2) :155-162.Abstract

 

This paper aims to address the assessment the similarity between documents or pieces of documents. For this purpose we have developed CASISS (CAlculation of SImilarity of Semi-Structured documents) method to quantify how two given texts are similar. The method can be employed in wide area of applications including content reuse detection which is a hot and challenging topic. It can be also used to increase the accuracy of the information retrieval process by taking into account not only the presence of query terms in the given document (Content Only search — CO) but also the topology (position continuity) of these terms (based on Content And Structure Search — CAS). Tracking the origin of the information in social media, copy right management, plagiarism detection, social media mining and monitoring, digital forensic are among other applications require tools such as CASISS to measure, with a high accuracy, the content overlap between two documents.

CASISS identify elements of semi-structured documents using elements descriptors. Each semi-structured document is pre-processed before the extraction of a set of elements descriptors, which characterize the content of the elements.

 

Hamza R, Titouna F. A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Information Security Journal: A Global Perspective . 2016;25 (4) :6.Abstract

In this article, a novel sensitive encryption scheme to secure the digital images based on the Zaslavsky chaotic map is proposed. We employ the Zaslavsky chaotic map as a pseudo-random generator to produce the key encryption of the proposed image cryptosystem. The cipher structure has been chosen based on permutation-diffusion processes, where we adopt the classic permutation substitution network, which ensures both confusion and diffusion properties for the encrypted image. Our proposed algorithm has high sensitivity in plain image and the secret key. Moreover, the results show that the characteristics of our approach have excellent performance, with high scores (NPRC = 99.61%, UACI = 33.47%, entropy (CipherImage)  8, and correlation coefficient  0). Experimental results have been studied and analyzed in detail with various types of security analysis. These results demonstrate that our proposed cryptosystem has highly satisfactory security performance and can withstand various attacks compared to state-of-the-art methods.

Ferradji MA, Zidani A. Collaborative Environment for Remote Clinical Reasoning Learning. International Journal of E-Health and Medical Communications (IJEHMC). 2016;7 (4) :20.Abstract

Despite the significant advances achieved these recent last years in terms of technologies widespread use in medical education, clinical reasoning learning (CRL) remains an extremely hard task in which there are still many gray areas that should be enlightened to better understand it. Furthermore, while CRL is basically a collaborative task implying the participation of many students and tutors working simultaneously on a same case, it should be considered from a social perspective. The authors followed then a collaborative-based learning approach, which consists in designing a shared workspace to support collaboration and enable social clinical knowledge acquisition. They started with a deep analysis of the CRL process in order to understand the usual way under which students learn together and then, highlight the vital collaborative learning tasks that need to be supported. The resulting designed model allowed us to shift towards Collaborative CRL (CCRL).

Boubiche DE, Boubiche S, Toral-Cruz H, Pathan A-SK, Bilami A, Athmani S. SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommunication Systems. 2016;62 (2) :277–288.Abstract

Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption keys to protect data during their transmission in the network. Indeed, the key generation and distribution mechanisms involve additional computation costs and consume more of energy. Considering this, in this paper, we propose a new security mechanism to secure data aggregation in WSNs called SDAW (secure data aggregation watermarking-based scheme in homogeneous WSNs). Our mechanism aims to secure the data aggregation process while saving energy. For this, the mechanism uses a lightweight fragile watermarking technique without encryption to insure the authentication and the integrity of the sensed data while saving the energy. The links between the sensor nodes and the aggregation nodes, and also the links between the aggregation nodes and the base station are secured by using the watermarking mechanism.

Boubiche S, Boubiche DE, Bilami A, Toral-Cruz H. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks. Sensors. 2016;16 (4) : 525.Abstract

Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. 

Pages