Papers by Abdelbasset TRAD
DNAC conference, Paris, France, November 2001. , 2001
Etude des Performances de TCP dans un Environnement Réseau à Très Haut Débit

International Journal of Ad hoc, Sensor & Ubiquitous Computing, 2011
Body Sensor Networks have considerably facilitated the continuous measurement of physiological pa... more Body Sensor Networks have considerably facilitated the continuous measurement of physiological parameters of human body. The sensors used to measure the body parameters, have several limitations in terms of power, computation capability, memory and communication capability. In this paper a novel architecture has been proposed to ensure continuous, unobtrusive and remote patient monitoring, taking into account the inherent hardware constraints of the sensors. The proposed architecture would enable senior citizens, patients with chronic ailments and patients requiring post-operative care to be remotely monitored in the comfort of their homes. Security threats and challenges inherent to wireless communication of sensor data have been discussed and a security mechanism to ensure data confidentiality, integrity and authentication has been proposed.

Dans ce rapport, nous présentons un modèle analytique afin d'évaluer la capacité en terme de comm... more Dans ce rapport, nous présentons un modèle analytique afin d'évaluer la capacité en terme de communications de voix sur IP dans un environnement réseau sans fil IEEE 802.11e. Nous illustrons des résultats de performance relatifs aux débits de codage typiques des codecs audio G.711 PCM (64 kbit/s), G.729 (8 kbit/s) et G.723 (6.3 kbit/s). Ces résultats montrent que les codecs G.729 et G.723 permettent d'avoir une capacité plus importante que celle obtenue avec le codec G.711, contraint par sa bande passante. Cette plus grande capacité est au dépens d'une dégradation de la qualité due à l'augmentation du délai auquel les codecs G.729 et G.723 sont plus sensibles que le G.711. Dans notre étude, nous analysons l'effet de l'introduction des Périodes à Accès Controllé (CAPs: Controlled Access Periods) durant la Période de Contention (CP) et son effet d'une augmentation remarquable de la capacité du réseau 802.11e en communications de voix. Nous montrons aussi que les débits de transmission élevés (allant jusqu'à 54 Mb/s) permettent une capacité importante de communications de voix sur IP (400 communications avec le G.711, 997 avec le G.729 et 1045 avec le G.723).

We investigate the performance limitations in the case of a large number of long distance voice o... more We investigate the performance limitations in the case of a large number of long distance voice over IP calls originating from different sources and transported through a best-effort IP network. We focus on the potentially negative effects of protocol header overhead, which is twice the voice payload generated by the high-compression audio codecs. These negative effects range from the inefcient use of bandwidth to the network congestion caused by the large number of short voice packets owing into the IP network, which degrades the real-time transmission performance and creates a fairness problem because of TCP trafc being suppressed. The approach developed in this paper is to adapt the transport protocol and the way in which it interacts with the network in order to support voice ows competing with TCP trafc in the Internet environment. We propose a new multiplexing scheme of RTP voice streams called TFMC (TCP-Friendly Multiplexing Control) that uses TCP-friendly equation-based cong...
Lsda
Proceedings of the 10th International Conference on Information Systems and Technologies, 2020
New Results - L'évolution de la voix sur IP

RESDA: Robust and Efficient Secure Data Aggregation Scheme in Healthcare using the IoT
2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC), 2019
The Internet of Things (IoT) connects huge number of devices using the internet to collect data. ... more The Internet of Things (IoT) connects huge number of devices using the internet to collect data. The IoT has a variety of application domains, including health care. In these scenarios, the patient people can use wearable or implanted medical sensors for measuring medical parameters anywhere and anytime. However, the flourish of healthcare using the IoT still faces many challenges related to security and privacy preserving. However, the data aggregation to centralized servers is quite challenging to protect against several attacks. In this paper, we propose an Robust and Efficient Secure data Aggregation Scheme in Healthcare using the IoT (RESDA). The main goal of our scheme is the security of data aggregation to be achieved without introducing significant overhead on the battery-limited sensors. Comparison with existing schemes, the proposed RESDA scheme can achieves several security requirements including confidentiality, authenticity and integrity. The performance evaluation results have demonstrated the feasibility and benefits of the proposed system as well as performance gains.

Procedia Computer Science, 2020
The Internet of Things (IoT) connects huge number of devices using the internet to collect data. ... more The Internet of Things (IoT) connects huge number of devices using the internet to collect data. The IoT has a variety of application domains, including health care. In this scenario, the patients can use wearable or implanted medical sensors for measuring medical parameters anywhere and anytime. The medical sensors are typically equipped with batteries and have limited energy. In order to prolong the network lifetime, a powerful routing protocols are required. In this paper, we propose PEERP: An Priority-based Energy-Efficient Routing Protocol for Reliable Data Transmission in Healthcare using the IoT. We classify health information into two categories assigned corresponding priorities: Emergency Situation and Vital Health Data. The Emergency Situation is the highest priority data and should be successfully delivered as soon as required. The Vital Health data is the data requested by doctors for continuous monitoring of the patients. The direct communication is used for critical data while Multihop communication is used for vital health data delivery. The simulation results show that the routing protocol can improve the energy utilization of the sensor nodes and prolong the network lifetime while guaranteeing the delivery ratio and reliability.

Ecole Supérieure En Sciences Informatiques (ESSI)
In the recent few years there is a remarkable improvement in the basic IEEE 802.11 WLAN standard ... more In the recent few years there is a remarkable improvement in the basic IEEE 802.11 WLAN standard because of its intrinsic lack of ability to provide the QoS requirements for the time stringent traffic (stern real-time requirements). The existing 802.11 WLAN standards, even if they can provide high data rates (up to 54 Mbps), do not support the quality of services. The efforts to bring QoS support in the basic standard results in the upcoming of the IEEE 802.11e WLAN standard, which is not yet finalized. In this thesis, we will study the basic idea to improve the voice quality in the wireless networking environment, where a guaranteed QoS is still a major concern to solve, and to adapt the audio source coding according to the network congestion state using the delay information, differentiate between two types of wireless network losses (loss due to wireless channel state and due to network congestion). First we will develop an analytical delay model for this environment using the 802.11e MAC to increase the simultaneous number of users in the network against a promised QoS and a good voice quality (evaluated using the metric Emodel, given the delay information and the impairment due to low rate codec), and then we

Transactions on Emerging Telecommunications Technologies, 2015
Medical wireless sensor networks (MWSNs) provide efficient solutions to the ubiquitous healthcare... more Medical wireless sensor networks (MWSNs) provide efficient solutions to the ubiquitous healthcare systems. Deployment of MWSNs for healthcare monitoring minimizes the need for healthcare professionals and helps the patients and elderly people to safely maintain an independent life. In hospitals, medical data sensors on patients produce an enormous volume of increasingly diverse real-time data. However, it is still critical to efficiently aggregate the different types of MWSNs data to the central servers. The security of collected and transmitted data from medical sensors is critical, whether inside the network or when stored at central servers. Efficient and secure aggregation of data is thus very essential to ensure integrity of data delivery, as well as the privacy of these data. In this research, we propose a priority-based compressed data aggregation scheme with integrity preservation to improve the aggregation efficiency of different types of health data. We use compressed sensing as a sampling procedure to reduce the communication overhead and minimize power consumption. Then, the compressed data are encrypted, and integrity is protected by a cryptographic hash algorithm to preserve data integrity. Finally, according to different data priorities, we apply an aggregation function and then send the data for diagnosis. The security analysis focuses on security properties assured by our scheme. Then, we will present experimental results for the evaluation of the proposed system on e-health sensor platform.
Mobile Location Estimation Approaches
... Subject : Mobile Location Estimation Approaches Realized by: Lamia Romdhani & Abdelbasset... more ... Subject : Mobile Location Estimation Approaches Realized by: Lamia Romdhani & Abdelbasset Trad ... With the introduction of wide bandwith digital systems timing information becomes relatively easy to obtain by correlation of a known pilot sequence at the receiver. ...

Dans ce rapport, nous présentons un modèle analytique afin d'évaluer la capacité en terme de comm... more Dans ce rapport, nous présentons un modèle analytique afin d'évaluer la capacité en terme de communications de voix sur IP dans un environnement réseau sans fil IEEE 802.11e. Nous illustrons des résultats de performance relatifs aux débits de codage typiques des codecs audio G.711 PCM (64 kbit/s), G.729 (8 kbit/s) et G.723 (6.3 kbit/s). Ces résultats montrent que les codecs G.729 et G.723 permettent d'avoir une capacité plus importante que celle obtenue avec le codec G.711, contraint par sa bande passante. Cette plus grande capacité est au dépens d'une dégradation de la qualité due à l'augmentation du délai auquel les codecs G.729 et G.723 sont plus sensibles que le G.711. Dans notre étude, nous analysons l'effet de l'introduction des Périodes à Accès Controllé (CAPs: Controlled Access Periods) durant la Période de Contention (CP) et son effet d'une augmentation remarquable de la capacité du réseau 802.11e en communications de voix. Nous montrons aussi que les débits de transmission élevés (allant jusqu'à 54 Mb/s) permettent une capacité importante de communications de voix sur IP (400 communications avec le G.711, 997 avec le G.729 et 1045 avec le G.723).
Voice-TFCC: A TCP-friendly congestion control scheme for VoIP flows
2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, 2008
Abstract Typically, VoIP traffic is deployed as best-effort traffic over Internet links. This voi... more Abstract Typically, VoIP traffic is deployed as best-effort traffic over Internet links. This voice traffic lacks effective and scalable end-to-end congestion control. We propose a new VoIP congestion control scheme called Voice-TFCC (voice TCP-friendly congestion control), ...

Energy-Efficient Multi-hop Hierarchical Routing Protocol using Fuzzy Logic (EMHR-FL) for Wireless Sensor Networks
2014 World Congress on Computer Applications and Information Systems (WCCAIS), 2014
In this paper, we present and evaluate a Multi-hop Hierarchical Routing Protocol using Fuzzy Logi... more In this paper, we present and evaluate a Multi-hop Hierarchical Routing Protocol using Fuzzy Logic (EMHR-FL) for Wireless Sensor Networks (WSN). The proposed protocol uses Fuzzy Logic Inference System (FIS) to select next hop CH (cluster-Head) by taking in to consideration some related metrics ( battery level of CHs, distance between CHs and node density of CHs) in order to maximize the total number of packets transmitted to BS (Base Station). The interest of our solution is twofold. First, it improves performance of classic EMHR in terms of total number of packets received by BS and time of First Node Die (FND). Second, our method makes a better decision of next hop CH selection than classical EMHR. We discuss in depth the system model of the proposed protocol which is planned to reach high performance. Simulation results and relevant performance comparisons with classical protocols are presented.
Performance trade-offs of encryption algorithms for Wireless Sensor Networks
2014 World Congress on Computer Applications and Information Systems (WCCAIS), 2014
ABSTRACT
SecOPP+: A secure dynamic scheme for adding new nodes in SecOPP protocol
2014 World Symposium on Computer Applications & Research (WSCAR), 2014
ABSTRACT

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2013
The rapid development in the Wireless Sensor Networks (WSNs) filed has allowed this technology to... more The rapid development in the Wireless Sensor Networks (WSNs) filed has allowed this technology to be used in many applications. In some of these applications, wireless sensor devices must be secured, especially when the captured information is valuable, sensitive, or for military usage. However, the implementation of security mechanisms on WSNs is a non-trivial task. Limitations in processing speed, battery power, bandwidth and memory constrain the applicability of existing cryptography algorithms for WSNs. The security of WSNs poses challenges because of the criticality of the data sensed by a node and in turn the node meets severe constraints like minimal energy, computational and communicational capabilities. Taking all the above said challenges energy efficiency or battery life time plays a major role in network lifetime. Providing security consumes some energy used by a node, so there is a need to minimize the energy consumption of any security algorithm that will be implemented in WSNs. As a solution, we apply an additive homomorphic encryption scheme, namely the elliptic curve ElGamal (EC-ElGamal) cryptosystem, and present the performance results of our implementation for the prominent sensor platform MicaZ mote.

2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013
Recently, several data aggregation schemes based on privacy homomorphism encryption have been pro... more Recently, several data aggregation schemes based on privacy homomorphism encryption have been proposed and investigated on wireless sensor networks. These data aggregation schemes provide better security compared with traditional aggregation since cluster heads (aggregator) can directly aggregate the ciphertexts without decryption; consequently, transmission overhead is reduced. Based on our survey of existing research efforts for ensuring secure data aggregation, a novel approach that uses homomorphic encryption and Message Authentication Codes (MAC) to achieve confidentiality, authentication and integrity for secure data aggregation in wireless sensor networks is proposed. Our experiments show that our proposed secure aggregation method significantly reduces computation and communication overhead and can be practically implemented in on-the-shelf sensor platforms.
Uploads
Papers by Abdelbasset TRAD