Papers by Bilami Azeddine

Nowadays, multimedia and real-time applications consume much network resources and so, need high ... more Nowadays, multimedia and real-time applications consume much network resources and so, need high flow rates and very small transfer delay. The current ad hoc networks (MANETs), in their original state, are not able to satisfy the requirements of quality of service (QoS). Researches for improving QoS in these networks are main topics and a subject of intensive researches. In Adhoc networks, the routing phase plays an important role for improving QoS. Numerous routing protocols (proactive, reactive and hybrid) were proposed. AODV (Adhoc On demand Distance Vector) is probably the more treated in literature In this article, we propose a new variant based on the AODV which gives better results than the original AODV protocol with respect of a set of QoS parameters and under different constraints, taking into account the limited resources of mobile environments (bandwidth, energy, etc…). The proposed variant (M-AODV) suggests that the discovering operation for paths reconstruction should ...

An Efficient Approach for Big Data Aggregation Mechanism in Heterogeneous Wireless Connected Sensor Networks
Wireless Personal Communications, 2021
Recently and due to the impressive growth in the amounts of transmitted data over the heterogeneo... more Recently and due to the impressive growth in the amounts of transmitted data over the heterogeneous sensor networks and the emerged related technologies especially the Internet of Things in which the number of the connected devices and the data consumption are remarkably growing, big data has emerged as a widely recognized trend and is increasingly being talked about. The term big data is not only about the volume of data, but also refers to the high speed of transmission and the wide variety of information that is difficult to collect, store and process using the available classical technologies. Although the generated data by the individual sensors may not appear to be significant, all the data generated through the many sensors in the connected sensor networks are able to produce large volumes of data. Big data management imposes additional constraints on the wireless sensor networks and especially on the data aggregation process, which represents one of the essential paradigms in wireless sensor networks. Data aggregation process can represent a solution to the problem of big data by allowing data from different sources to be combined to eliminate the redundant ones and consequently reduce the amounts of data and the consumption of the available resources in the network. The main objective of this work is to propose a new approach for supporting big data in the data aggregation process in heterogeneous wireless sensor networks. The proposed approach aims to reduce the data aggregation cost in terms of energy consumption by balancing the data loads on the heterogeneous nodes. The proposal is improved by integrating the feedback control closed loop to reinforce the balance of the data aggregation load on the nodes, maintaining therefore an optimal delay and aggregation time.

MONet
International Journal of Pervasive Computing and Communications, 2017
Purpose The purpose of this paper is to ensure power efficiency in wireless sensor networks (WSNs... more Purpose The purpose of this paper is to ensure power efficiency in wireless sensor networks (WSNs) through a new framework-oriented middleware, based on a biologically inspired mechanism that uses an evolutionary multi-objective optimization algorithm. The authors call this middleware framework multi-objective optimization for wireless sensor networks (MONet). Design/methodology/approach In MONet, the middleware level of each network node autonomously adjusts its routing parameters according to dynamic network conditions and seeks optimal trade-offs among performance objectives for a balance of its global performance. MONet controls the cooperation between agents (network nodes) while varying transmission paths to reduce and distribute power consumption equitably on all the sensor nodes of network. MONet-runtime uses a modified TinyDDS middleware platform. Findings Simulation results confirm that MONet allows power efficiency to WSN nodes while adapting their sleep periods and self-...

Security and Privacy, 2018
Ensuring security for communications, services, devices, and end-users has been and continues to ... more Ensuring security for communications, services, devices, and end-users has been and continues to be a major concern in today's Internet. Recently, with the growing research advances toward the realization of the Internet of Things (IoT), security concerns are expected to rise substantially. This is due to the fact that a sheer number of tiny wireless and smart devices, handling personal and contextual data, will be connected permanently to the Internet. The connected things are henceforth able to interact autonomously with each other and with their users. This paper focuses on Human-to-Thing (H2T) interactions that are necessary in many important IoT applications, namely E-healthcare, connected home, smart cities, and so on. Such a communication style is characterized by many technological and material heterogeneities, which exposes the connected (and already constrained) things to Denial of Service (DoS) threats and makes security more challenging. This paper addresses the security issue with H2T communications and presents an asymmetric-selective mechanism to guarantee effective protection of such communication style while ensuring good resilience against DoS attacks. The assessment results show the efficiency of our proposal.

IEEE Access, 2018
The emergence of new data handling technologies and analytics enabled the organization of big dat... more The emergence of new data handling technologies and analytics enabled the organization of big data in processes as an innovative aspect in wireless sensor networks (WSNs). Big data paradigm, combined with WSN technology, involves new challenges that are necessary to resolve in parallel. Data aggregation is a rapidly emerging research area. It represents one of the processing challenges of big sensor networks. This paper introduces the big data paradigm, its main dimensions that represent one of the most challenging concepts, and its principle analytic tools which are more and more introduced in the WSNs technology. The paper also presents the big data challenges that must be overcome to efficiently manipulate the voluminous data, and proposes a new classification of these challenges based on the necessities and the challenges of WSNs. As the big data aggregation challenge represents the center of our interest, this paper surveys its proposed strategies in WSNs.

International Journal of Distributed Systems and Technologies, 2018
This article describes how fault tolerance is an essential issue for many WSN (Wireless Sensor Ne... more This article describes how fault tolerance is an essential issue for many WSN (Wireless Sensor Network) applications such as wildlife monitoring, battlefield surveillance and health monitoring. It represents a great challenge for researchers regarding to the characteristics of sensor nodes which are prone to failures due essentially to their limited resources. Faults may occur, not only when sensor nodes exhaust their energy, but also when the congestion phenomenon emerges, because of a high traffic in the network and limited storage capacity of the sensor nodes. In order to support fault tolerance in WSNs, the authors propose a new scheme which incorporates a link quality estimation algorithm and a congestion detection mechanism to enable nodes that present high quality links to be chosen for routing in a non-congested area in case of faults. Evaluations through simulations under NS2 show that our proposed protocol tolerates faults with a minimum cost relatively to HEEP protocol an...

International Journal of Systems, Control and Communications, 2017
Ensuring (QoS) in wireless sensor networks (WSNs) is a challenging issue due to the lack of resou... more Ensuring (QoS) in wireless sensor networks (WSNs) is a challenging issue due to the lack of resources and energy exhausting of sensor nodes. In this paper we propose a new QoS aware routing protocol for multi-hop wireless sensor networks based on cross-layer interaction between the network, MAC and physical layers. At physical layer, a link quality estimator is studied for the purpose of evaluating link quality. At MAC layer, a differentiated services mechanism is used to distinguish between real time and non-real time packets and to allocate more channel resources for real time traffic; TDMA slots also have been modified to allocate more and earlier slots to real time packets. At network layer, a routing path selection algorithm is introduced for QoS optimisation. Simulation results show that our proposed protocol improves network's performances in terms of energy efficiency and QoS.

International Journal of Wireless and Mobile Computing, 2017
Many self-adaptation routing schemes have been proposed for sensor networks. The most relevant of... more Many self-adaptation routing schemes have been proposed for sensor networks. The most relevant of them consider a hierarchical topology and aim to meet energy conservation and QoS requirements in a homogeneous environment. In such networks, one specific algorithm is commonly applied by all nodes inside clusters. Contrarily, in this paper, we propose a heterogeneous routing by applying different strategies according to specific parameters at the same time inside different clusters. Moreover, each cluster can adopt different strategies at different moments under different conditions. This approach leads to a new self-adaptation protocol based on heterogeneity of the routing process in a multi-hop clustering WSN. The proposal uses a set of mechanisms that have been adopted in well-known protocols (HEEP, APTEEN, LEACH, PEGASIS, etc.) taking into account their strengths and weaknesses. Simulations under NS2 show that our proposal, based on heterogeneous routing protocol, prolongs the network lifetime with different ratios compared to HEEP, PEGASIS and others.

Security Breaches and Threat Prevention in the Internet of Things
The maturity of the IoT depends on the security of communications and the protection of end-user&... more The maturity of the IoT depends on the security of communications and the protection of end-user's privacy. However, technological and material heterogeneities, and the asymmetric nature of communications between sensor nodes and ordinary Internet hosts, make the security in this case more problematic. Major problem facing the large deployment of IoT is the absence of a unified architecture and a lack of common agreement in defining protocols and standards for IoT parts. Many solutions have been proposed for the standardization of security concepts and protocols in IoT at different layers. Even though many advances and proposals were made for IoT adaptation as IPv6 for Low Power Wireless Personal Area Network (6LoWPAN), and at application layer with protocols such as XMPP, MQTT, CoAP, etc., security of the IoT remains a very challenging task and an open research topic. This chapter focuses on existing protocols and different proposed mechanisms in literature to secure communicat...

Toward Adaptive Data Aggregation Protocols in Wireless Sensor Networks
Proceedings of the International Conference on Internet of things and Cloud Computing - ICC '16, 2016
Data aggregation has emerged as a basic concept in wireless sensor networks. By combining data an... more Data aggregation has emerged as a basic concept in wireless sensor networks. By combining data and eliminating redundancy, this concept showed its effectiveness in terms of reducing resources consumption. The data aggregation problem is not new and has been widely studied in wireless sensor networks. However, most of the proposed solutions are based on a static data aggregation scheme and do not consider the network constraints evolution such as energy bandwidth, overhead and transmission delay. To dynamically optimize the tradeoff between the data aggregation process and the network constraints, a new paradigm has been introduced recently named the feedback control system. The main idea is to adapt the data aggregation degree to the environment changes and the sensor network applications. The feedback control for data aggregation remains relatively a new research area and only few works have introduced this concept. Therefore this work points out this research field by surveying the different existing protocols.

Sensors, 2016
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks... more Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.

Computer Networks, 2015
The Internet of Things (IoT) is an emerging and promising paradigm that can be considered as an e... more The Internet of Things (IoT) is an emerging and promising paradigm that can be considered as an extension of the Internet to interconnect all kinds of smart objects around us to provide a pervasive (or ubiquitous) information access. Wireless Sensor Networks (WSNs), as a vital component of the IoT, allow the representation of the dynamic characteristics of the real world in the Internet's virtual world. Thus, sensor nodes are henceforth considered as Internet hosts and, may act as web servers or clients. The maturity of the Internet of Things is arguably linked to communications security and end-users privacy protection. However, the material and technological heterogeneity as well as the asymmetric nature of the communications between the sensor nodes and the classical Internet hosts are making security a challenging problem. In this context, many recent works focus on leveraging IP-based security protocols for IoT, after adapting them to WSN's constraints commonly by messages compression or by computational-load distribution techniques. In this paper we propose a 6LoWPAN (IPv6 over Low power Wireless Personal Area Networks) compression for the header of HIP (Host Identity Protocol) packets, as well as, an adapted distribution scheme of security computational load in HIP Base EXchange (HIP-BEX). To achieve extremely lightweight end-to-end (E2E) security, we combine both proposed compression and distribution models for HIP in WSN's side, in the IoT. The evaluation results show clearly that the proposed solution, named Compressed and Distributed HIP (CD-HIP), is sufficiently energy efficient with a slight security establishment delay, and a good level of compatibility with the standard HIP.

Geographic routing has attracted attention since it is a memory-less and scalable approach. Two t... more Geographic routing has attracted attention since it is a memory-less and scalable approach. Two types of geographic routing protocols are proposed in the literature; those relying on exact position information using GPS, and other algorithms using virtual coordinate system (VCS). In recently proposed VCS, the unique identity cannot be easily assigned to any node due to the amount of reference points needed to produce a unique reference framework. This paper proposes a fundamentally different way of designing a new virtual coordinate system for localization in wireless sensor network which relies only on local connectivity information and per-neighbor communication. Using this new virtual coordinate system, we build a logical topology on which we apply a new fully simple lightweight geographic routing protocol. It is designed to be scalable, loop free, energy efficient and it guarantees delivery with the selection of the shortest path using hops' count.
Feedback Control for Data Aggregation in Wireless Sensor Networks: A Survey

Telecommunication Systems, 2015
Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using ... more Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption keys to protect data during their transmission in the network. Indeed, the key generation and distribution mechanisms involve additional computation costs and consume more of energy. Considering this, in this paper, we propose a new security mechanism to secure data aggregation in WSNs called SDAW (secure data aggregation watermarking-based B Djallel Eddine Boubiche
IEEE Communications Letters, 2015
Ensuring data aggregation integrity introduces new challenges for data aggregation security proto... more Ensuring data aggregation integrity introduces new challenges for data aggregation security protocols in heterogeneous wireless sensor networks. In this paper, we propose an efficient watermarking based security strategy to ensure data aggregation integrity in heterogeneous WSNs. The proposed security scheme suggests a new fragile watermarking technique based on a dynamic embedding mechanism and a cross-layer approach. Compared to the existing heterogeneous security solutions, our system respects the resources limitations of the homogenous sensor nodes and optimizes the data aggregation process on the heterogeneous aggregation nodes. The proposal is evaluated using simulation.

RTIC: Reputation and Trust Evaluation Based on Fuzzy LogIC System for Secure Routing in Mobile Ad Hoc Networks
Communications in Computer and Information Science, 2012
ABSTRACT Ad hoc networks are vulnerable to many types of attacks. Their success will undoubtedly ... more ABSTRACT Ad hoc networks are vulnerable to many types of attacks. Their success will undoubtedly depend on the trust they bring to their users. To enhance the security of MANETs, it is important to rate the trustworthiness of other nodes without central authorities to build up a trust environment. This paper expands on relevant fuzzy logic concepts to propose an approach to establish quantifiable trust levels between the nodes of Ad hoc networks. The proposed solution defines additional operators to fuzzy logic in order to find an end to end route which is free of malicious nodes with collaborative effort from the neighbors. In our scheme (RTIC) the path with more trusted decision value is selected as a secure route from source to destination. In order to prove the applicability of the proposed solution, we demonstrate the performance of our model through NS-2 simulations.

A New Hybrid Authentication Protocol to Secure Data Communications in Mobile Networks
Studies in Computational Intelligence, 2013
ABSTRACT The growing area of lightweight devices, such as mobile cell phones, PDA conduct to the ... more ABSTRACT The growing area of lightweight devices, such as mobile cell phones, PDA conduct to the rapid growth of mobile networks, they are playing important role in everyone’s day. Mobile Networks offer unrestricted mobility and tender important services like M-business, M-Learning, where, such services need to keep security of data as a top concern. The root cause behind the eavesdroppers in these networks is the un-authentication. Designing authentication protocol for mobile networks is a challenging task, because, mobile device’s memory, processing power, bandwidths are limited and constrained. Cryptography is the important technique to identify the authenticity in mobile networks. The authentication schemes for this networks use symmetric or asymmetric mechanisms. In this paper, we propose a hybrid authentication protocol that is based on Elliptic Curve Cryptography which is, actually, the suitable technique for mobile devices because of its small key size and high security.

A Cross Layer Energy Efficient Security Mechanism for Denial of Sleep Attacks on Wireless Sensor Network
Communications in Computer and Information Science, 2012
Wireless sensor networks are particularly exposed to several kinds of attacks. Due to resources c... more Wireless sensor networks are particularly exposed to several kinds of attacks. Due to resources constrained property in WSN, Denial of sleep attacks is recognized as one of the most serious threats. Attacks of this type exhaust power supply of sensor nodes and reduce the sensor lifetime. Most of existing researches propose authentication and encryption solutions to protect the network from denial of sleep attacks. However, it is more efficient to use simpler solutions to the same security challenges due to limited processing capability, memory storage, and energy capacity. In this paper we propose a cross layer energy-efficient security mechanism to protect the network from these attacks. Simulation reveals that our proposal is energy efficient and able to achieve significant performance in term of preventing network nodes from different denial of sleep attacks.
Uploads
Papers by Bilami Azeddine