0000000000131233
AUTHOR
Sidi-mohammed Senouci
On-Demand Security Framework for 5GB Vehicular Networks
Building accurate Machine Learning (ML) at-tack detection models for 5G and Beyond (5GB) vehicular networks requires collaboration between Vehicle-to-Everything (V2X) nodes. However, while operating collaboratively, ensuring the ML model’s security and data privacy is challenging. To this end, this article proposes a secure and privacy-preservation on-demand framework for building attack-detection ML models for 5GB vehicular networks. The proposed framework emerged from combining 5GB technologies, namely, Federated Learning (FL), blockchain, and smart contracts to ensure fair and trustedinteractions between FL servers (edge nodes) with FL workers (vehicles). Moreover, it also provides an ef…
Dissemination protocol for Heterogeneous Cooperative Vehicular Networks
International audience; The difficulties associated with network connectivity, unreliable channels, and city environment characteristics make data dissemination task in vehicular urban networks a real challenge. Recently, some interesting solutions have been proposed to perform data dissemination in this environment. Starting from the analysis of these solutions, we present a new dissemination protocol named DHVN (Dissemination protocol for Heterogeneous Cooperative Vehicular Networks) that considers: (i) roads topology, (ii) network connectivity and possible partitioning in case of low traffic density, and (iii) heterogeneous communication capabilities of the vehicles. We compare our proto…
Toward a lightweight and efficient UAV‐aided VANET
International audience; Connectivity in a smart vehicular network is quite sensitive and highly affected by its dynamic network topology. Issues related to the intermittent nature of connectivity may arise due to the high mobility of nodes and network heterogeneity. In sparse areas, a vehicular network is basically a disruption‐tolerant network suffering from frequent disconnections, long delays, and messages loss. Facing these issues, and specifically for time‐sensitive applications, Unmanned Aerial Vehicle (UAV) can provide valuable assistance to Vehicular Ad Hoc Network (VANET) by assuming a relay node role between disconnected segments in the road. In such scenarios, effective communica…
A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…
Clustering-Based Algorithm for Connectivity Maintenance in Vehicular Ad-Hoc Networks
International audience; Among recent advances in wireless communication technologies' field, Vehicular Ad-hoc Networks (VANETs) have drawn the attention of both academic and industry researchers due to their potential applications including driving safety, entertainment, emergency applications, and content sharing. VANET networks are characterized by their high mobile topology changes. Clustering is one of the control schemes used to make this global topology less dynamic. It allows the formation of dynamic virtual backbone used to organize the medium access, to support quality of service and to simplify routing. Mainly, nodes are organized into clusters with at least one cluster head (CH) …
Network Connectivity and Area Coverage for UAV Fleet Mobility Model with Energy Constraint
International audience; Our main focus through the present paper is on developing an original distributed mobility model for autonomous fleet of interconnected UAVs (Unmanned Aerial Vehicles) performing an area exploration mission. The UAVs, equipped with wireless ad-hoc capabilities, are required to optimally explore an area while maintaining connectivity with their neighboring UAVs and the base station. Because energy is a scarce resource, especially for UAVs, its wise management is quite beneficial for the network lifetime and mission success. Hence, the proposed mobility model, compared to other models in the literature, is the first to ever include the remaining energy level as decisio…
EV-planning: Electric vehicle itinerary planning
International audience; In the latest few years, lot of efforts have been done to pave the way to sustainable mobility, in order to solve pollution problems and fuel shortage. The use of electric vehicles (EV) is considered as one of the best ecologic and economic solution. However, autonomy barriers and limitations slow the progress and the deployment of this technology. In this paper, we propose an advanced electric vehicles' fleet management architecture. This architecture considers the most important factors that can affect the traveling mode of electric vehicles, in order to offer different services to fleet management companies for an efficient monitoring and management of their fleet…
An optimization location scheme for electric charging stations
International audience; Due to environmental issues, electric mobility is one of the mobility alternatives that are receiving a huge attention nowadays. In fact, in the last few years electric vehicles have entered the world's car market. This revolutionary technology requires a fast deployment of electric charging stations since the key issue in this system is recharging the batteries. In this work, we propose an optimized algorithm to locate electric-vehicles charging stations. Different factors and limitations are considered and a real case study is given as an application. We first determine the appropriate strict constraints and cost of charging stations' location; and then we propose …
Smart Grid Security: A new Approach to Detect Intruders in a Smart Grid Neighborhood Area Network
International audience; In this paper, we propose an efficient and lightweight attack detection mechanism for a smart grid Neighborhood Area Network (NAN) that combine between distributed and centralized intrusion detection. A NAN includes the customers' appliances, smart meters and collectors. The smart meters measure the power consumption of each appliance and the collectors aggregate the measures and forward them to the control center for analysis. Intrusion Detection System (IDS) agents, proposed in our framework, run in a distributed fashion at smart meters level and in a centralized fashion at collector and control center nodes. A combination between a rule-based detection and a learn…
Multi-agent control architecture for RFID cyberphysical robotic systems initial validation of tagged objects detection and identification using Player/Stage
International audience; The objective of this paper is to describe and validate a multi-agent architecture proposed to control RFID Cyber-Physical Robotic Systems. This environment may contain human operators, robots (mobiles, manipulators, mobile manipulators, etc.), places (workrooms, walls, etc.) and other objects (tables, chairs, etc.). The proposed control architecture is composed of two types of agents dispatched on two levels. We find at the Organization level a Supervisory agent to allow operators to configure, manage and interact with the overall control system. At the Control level, we distinguish the Robots agents, to each robot (mobiles, manipulators or mobile manipulators) is a…
A Trusted Hybrid Learning Approach to Secure Edge Computing
Securing edge computing has drawn much attention due to the vital role of edge computing in Fifth Generation (5G) wireless networks. Artificial Intelligence (AI) has been adopted to protect networks against attackers targeting the connected edge devices or the wireless channel. However, the proposed detection mechanisms could generate a high false detection rate, especially against unknown attacks defined as zero-day threats. Thereby, we propose and conceive a new hybrid learning security framework that combines the expertise of security experts and the strength of machine learning to protect the edge computing network from known and unknown attacks, while minimizing the false detection rat…
Theoretical Game Approach for Mobile Users Resource Management in a Vehicular Fog Computing Environment
Vehicular Cloud Computing (VCC) is envisioned as a promising approach to increase computation capabilities of vehicle devices for emerging resource-hungry mobile applications. In this paper, we introduce the new concept of Vehicular Fog Computing (VFC). The Fog Computing (FC) paradigm evolved and is employed to enhance the quality of cloud computing services by extending it to the edge of the network using one or more collaborative end-user clients or near-user edge devices. The VFC is similar to the VCC concept but uses vehicles resources located at the edge of the network in order to serve only local on-demand mobile applications. The aim of this paper is to resolve the problem of admissi…
Elliptic Curve-Based Secure Multidimensional Aggregation for Smart Grid Communications
In smart grid, data aggregation is considered as an essential paradigm in assessing information about current energy usage. To achieve the privacy-preserving goal, several homomorphic-based solutions have been proposed. However, these solutions either consider one-dimensional information or use costly pairing computation in order to ensure source authentication. In fact, smart grid data are likely to be multidimensional (e.g., time, purpose, and so on) for more accurate control. In addition, the aggregation node in smart grid needs to verify data that come from several smart meters in a residential area; hence, the verification must be cost-efficient. In this paper, we propose a scheme that…
dSDiVN: A Distributed Software-Defined Networking Architecture for Infrastructure-Less Vehicular Networks
In the last few years, the emerging network architecture paradigm of Software-Defined Networking (SDN), has become one of the most important technology to manage large scale networks such as Vehicular Ad-hoc Networks (VANETs). Recently, several works have shown interest in the use of SDN paradigm in VANETs. SDN brings flexibility, scalability and management facility to current VANETs. However, almost all of proposed Software-Defined VANET (SDVN) architectures are infrastructure-based. This paper will focus on how to enable SDN in infrastructure-less vehicular environments. For this aim, we propose a novel distributed SDN-based architecture for uncovered infrastructure-less vehicular scenari…
A secure intersection-based routing protocol for data collection in urban vehicular networks
Data routing has gained great intention since the appearance of Vehicular Networks (VANETs). However, in the presence of attackers, reliable and trustworthy operations in such networks become impossible without securing routing protocols. In this paper, we target to study and design a secure routing protocol S-GyTAR for vehicular environments. Several kinds of routing techniques are proposed in the literature and could be classified into topology-based or position-based strategies. Position-based is the most investigated strategy in vehicular networks due to the unique characteristics of such networks. For this reason, this work is based on the well-known intersection-based routing protocol…
Optimization of Data Harvesters Deployment in an Urban Areas for an Emergency Scenario
International audience; Since its appearance in the VANETs research community, data collection where vehicles have to explore an area and collect various local data, brings various issues and challenges. Some architectures were proposed to meet data collection requirements. They can be classified into two categories: Decentralized and Centralized self-organizing where different components and techniques are used depending on the application type. In this paper, we treat time-constrained applications in the context of search and rescue missions. For this reason, we propose a centralized architecture where a central unit plans and manages a set of vehicles namely harvesters to get a clear ove…
MCMIPv6: Multicast Configuration-based Mobile IPv6 protocol
International audience; Mobile IPv6 (MIPv6) and its basic extension for network mobility NEMO were initially designed to manage the mobility of device users and networks respectively while maintaining a permanent IP address. Nevertheless, the different MIPv6's experiments have shown many lacks in case of high mobility of nodes such as in vehicular networks. To overcome these lacks, many solutions have been proposed by the research community. The most famous ones are HMIPv6 and FMIPv6 tackling each a specific issue. On the one hand, FMIPv6 introduces a solution to effectively minimize the L2/L3 latency and avoid the packets losses during the handover procedure. On the other hand, HMIPv6 is e…
A distributed detection and prevention scheme from malicious nodes in vehicular networks
Summary Vehicular environments still remain vulnerable to various potential attacks because of continuous interactions and information exchange between vehicles despite the deployment of authentication techniques by communication standards. Therefore, an authenticated node with a certificate could initiate an attack while complying with implemented protocols. Some mechanisms were proposed to enhance communication technologies, but none of them was able to anticipate nodes' behavior. They also mismanage oscillating vehicles, because they evict them automatically after misbehaving. In this paper, we propose a preventive mechanism, namely, Intrusion Prevention and Detection System (IPDS), able…
A hybrid algorithm for planning public charging stations
International audience; Green mobility solutions are receiving currently an enormous attention. Indeed, during last years, electric vehicles, being part of the field of the smart-grid, entered the automobile market of the whole world. This technology requires an effective deployment of charging stations of electric refill since the main problem in this system remains over the duration of refill of the batteries. In this work, we propose an optimized algorithm to locate electric charging stations. The main task of the algorithm is to find the best site of charging stations locations so as to minimize loss on the way to the charging station, as well as minimize investment cost, we take into a…
Energy-aware design for wireless mesh networks
International audience; Wireless mesh networks (WMNs) are the next step in the development of the wireless architecture, delivering wireless services for a large variety of users in personal, local, campus, and metropolitan areas. Energy efficiency solutions are becoming more vital for both local access networks and wireless networks and Green IT has attracted a considerable attention. However, the application of green network for wireless mesh networks has seldom been described in the literature. However, WMNs infrastructure devices are always active. Thus, during lower traffic periods the energy consumption is the same as in busy hours, while it would be possible to save a large amount of…
Sustainable Transportation Management System for a Fleet of Electric Vehicles
In the last few years, significant efforts have been devoted to developing intelligent and sustainable transportation to address pollution problems and fuel shortages. Transportation agencies in various countries, along with several standardization organizations, have proposed different types of energy sources (such as hydrogen, biodiesel, electric, and hybrid technologies) as alternatives to fossil fuel to achieve a more ecofriendly and sustainable environment. However, to achieve this goal, there are significant challenges that still need to be addressed. We present a survey on sustainable transportation systems that aim to reduce pollution and greenhouse gas emissions. We describe the ar…
PV-Alert: A fog-based architecture for safeguarding vulnerable road users
International audience; High volumes of pedestrians, cyclists and other vulnerable road users (VRUs) have much higher casualty rates per mile; not surprising given their lack of protection from an accident. In order to alleviate the problem, sensing capabilities of smartphones can be used to detect, warn and safeguard these road users. In this research we propose an infrastructure-less fog-based architecture named PV-Alert (Pedestrian-Vehicle Alert) where fog nodes process delay sensitive data obtained from smartphones for alerting pedestrians and drivers before sending the data to the cloud for further analysis. Fog computing is considered in developing the architecture since it is an emer…
Col : A Data Collection Protocol for Vanet
International audience; In this paper, we present a protocol to collect data within a vehicular ad hoc network (VANET). In spite of the intrinsic dynamic of such network, our protocol simultaneously offers three relevant properties: (1) It allows any vehicle to collect data beyond its direct neighborhood (i.e., vehicles within direct communication range) using vehicle-to-vehicle communications only (i.e., the infrastructure is not required); (2) It tolerates possible network partitions; (3) It works on demand and stops when the data collection is achieved. To the best of our knowledge, this is the first collect protocol having these three characteristics. All that is chiefly obtained thanks…
A Geographical Self-Organizing Approach for Vehicular Networks
Cooperative vehicular networks have always been considered as the perfect way to bring more comfort to the passengers and more safety to the human life. Thus, research community and governmental organizations are interested to study and deploy these networks. The vehicular networks principle is connecting vehicles to each other and to existing infrastructure. However, their industrialization faces some challenges: (i) high mobility, (ii) frequently partitioned network, (iii) geographically constrained topology, and (iv) scalability. Therefore, in contrast to traditional networks, vehicular network protocols focus on both achieving adequate QoS level and reducing overhead. Achieving these tw…
Secure and efficient verification for data aggregation in wireless sensor networks
Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…
Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments
Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…
PRIVANET: An Efficient Pseudonym Changing and Management Framework for Vehicular Ad-Hoc Networks
Protecting the location privacy is one of the main challenges in vehicular ad-hoc networks (VANETs). Although, standardization bodies, such as IEEE and ETSI, have adopted a pseudonym-based scheme as a solution for this problem, an efficient pseudonym changing and management is still an open issue. In this paper, we propose PRIVANET, a complete and efficient pseudonym changing and management framework. The PRIVANET has a hierarchical structure and considers the vehicular geographic area as a grid. Each cell of this grid contains one or many logical zones, called vehicular location privacy zones (VLPZs). These zones can easily be deployed over the widespread roadside infrastructures (RIs), su…
MDP-Based Resource Allocation Scheme Towards a Vehicular Fog Computing with Energy Constraints
As mobile applications deliver increasingly complex functionalities, the demands for even more intensive computation would quickly transcend energy capability of mobile devices. On one hand and in an attempt to address such issues, fog computing paradigm is introduced to mitigate the limited energy and computation resources available within constrained mobile devices, by moving computation resources closer to their users at the edge of the access network. On another hand, most of electric vehicles (EVs), with increasing computation, storage and energy capabilities, spend more than 90% of time on parking lots. In this paper, we conceive the basic idea of using the underutilized computation r…
Combinatorial Double Auction Radio Resource Allocation Model in Crowd Networks
International audience; Industrial Partners (IPs) with Mobile Network Operators (MNOs) are extending the mobile network infrastructure with Small Cells (SCs) in order to meet the growing mobile traffic demand. Due to the increasing number of telecommunication market competitors and the scarcity of radio resources, static sharing schemes are no more efficient. New dynamic schemes should be considered to meet both user expectations and economic success. In a crowd networking context, we propose in this work a dynamic radio resource scheme based on combinatorial double auctions. The participants in these auctions are the MNOs considered as buyers and the IPs, providers of SCs, considered as se…
Green Fleet Management Architecture : Application to Economic Itineary Planning
International audience; Over the last decade, great efforts are invested in reducing emissions of greenhouse gases at a world scale. We should therefore elaborate new global solutions to this type of pollution, in which fleets of vehicles are heavily contributing. In this paper, we propose a novel green architecture for global fleet management that considers the most important actors. The proposed architecture allows to collect useful information from several fleets of vehicles and their environment, and provides real-time services to companies that own one of these fleets. One important service is the calculation of economic itinerary. We propose a new "green" calculation method that is ba…
How to prevent cyber-attacks in inter-vehicle communication network?
In this work, we aim to secure communication in a vehicular network by providing a proactive mechanism that can detect and predict with a high accuracy the future behavior of malicious attacker. In fact, the mechanisms proposed in the literature consider only detection mechanisms and do not prevent attacks that may arise in the network. Simulation results show that our mechanism has a high detection rate, low false positive rate while generating a low communication overhead.
Energy-Aware Design for Wireless Mesh Networks
International audience
Utilisation De La Conduite En Convoi Pour La Conception De Nouveau Systèmes De Transports Innovants Pour La Livraison De Marchandises Dans Les Centres-Villes
International audience
Background subtraction for aerial surveillance conditions
International audience; The first step in a surveillance system is to create a representation of the environment. Background subtraction is widely used algorithm to define a part of an image that most time remains stationary in a video. In surveillance tasks, this model helps to recognize those outlier objects in an area under monitoring. Set up a background model on moving platforms (intelligent cars, UAVs, etc.) is a challenging task due camera motion when images are acquired. In this paper, we propose a method to support instabilities caused by aerial images fusing spatial and temporal information about image motion. We used frame difference as first approximation, then age of pixels is …
Recent advances on security and privacy in intelligent transportation systems (ITSs)
New Optimization and Security Approaches to Enhance the Smart Grid Performance and Reliability
International audience; Nowadays, the Smart Grid (SG) is becoming smarter thanks to the integration of different information and communication technologies to enhance the reliability and efficiency of the power grid. However, several issues should be met to ensure high SG performance. Among these issues, we cite the problem of electric vehicles (EVs) integration into the SG to avoid electricity intermittence due to the important load that EVs can create. Another issue is the SG communication network security that can be attempted by malicious intruders in order to create damages and make the power grid instable. In this context, we propose at a first level a Bayesian game-theory model that …
HINTS: A novel approach for realistic simulations of vehicular communications
One of the main challenges in the Vehicular Ad-Hoc Networks (VANETs) research domain is the simulation of vehicular communications using realistic mobility models. Several efforts have been put lately in this purpose; yet, the proposed models are either inappropriate, or carry significant disadvantages. In this paper, we propose a novel approach for realistic simulations in vehicular networks, inspired from the hierarchical video and image compression technique. We developed HINTS (Hybrid Integration of Network and Traffic Simulators), the correspondent platform, engendered from the integration of SUMO, a traffic simulator and NS-3, a network simulator after adding some supplemental modules…
Hpdm : A Hybrid Pseudonym Distribution Method for Vehicular Ad-Hoc Networks
Abstract Protecting the location privacy of drivers is still one of the main challenges in Vehicular Ad-hoc Networks (VANETs). The changing of pseudonym is commonly accepted as a solution to this problem. The pseudonyms represent fake vehicle identifiers. Roadside Units (RSUs) play a central role in the existing pseudonyms distribution solutions. Indeed, the VANET area should totally be covered by RSUs in order to satisfy the demand of vehicles in terms of pseudonyms. However, the total coverage is costly and hard to be achieved, especially in the first phase of VANETs deployment. In addition, RSUs could be overloaded due to the large number of pseudonyms requests that could be received fro…
Lightweight and Adaptive Anonymous Authentication Protocols in the Internet of Things Dedicated to E-Health Applications
International audience
Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology
International audience; Advances in wireless communications and microelectronics have spearheaded the development of unmanned aerial vehicles (UAVs), which can be used to augment a ground network composed of sensors and/or vehicles in order to increase coverage, enhance the end-to-end delay, and improve data processing. While UAV-aided networks can potentially find applications in many areas, a number of issues, particularly security, have not been readily addressed. The intrusion detection system is the most commonly used technique to detect attackers. In this paper, we focus on addressing two main issues within the context of intrusion detection and attacker ejection in UAV-aided networks…
A Sequential Game Approach for Computation-Offloading in an UAV Network
International audience; Small drones are currently emerging as versatile nascent technology that can be used in exploration and surveillance missions. However, most of the underlying applications require very often complex and time-consuming calculations. Although, the limited resources available onboard the small drones, their mobility, the computation delays and energy consumption make the operation of these applications very challenging. Nevertheless, computation-offloading solutions provide feasible resolves to mitigate the issues facing these constrained devices. In this context, we address in this paper the problem of offloading highly intensive computation tasks, performed by a fleet…
VLPZ: The Vehicular Location Privacy Zone
International audience; One of the key challenges in the success of vehicular ad hoc networks (VANETs) is to consider the location privacy of drivers. Although, the pseudonym changing approach is suggested by standardization development organizations such as IEEE and ETSI, the development of an effective pseudonym changing strategy is still an open issue. The existing pseudonym changing strategies are either not effective to protect against the pseudonyms linking attacks or can have a negative impact on the VANETs’ applications. To address these issues, this paper proposes a new pseudonym changing strategy based on the Vehicular Location Privacy Zone (VLPZ), which is a roadside infrastructu…
Multi-Scale Feature Extraction for Vehicle Detection Using Phis-Lbp
International audience; Multi-resolutionobjectdetectionfacesseveraldrawbacksincludingitshighdimensionalityproducedby a richer image representation in different channels or scales. In this paper, we propose a robust and lightweight multi-resolution method for vehicle detection using local binary patterns (LBP) as channel feature. Algorithm acceleration is done using LBP histograms instead of multi-scale feature maps and by extrapolating nearby scales to avoid computing each scale. We produce a feature descriptor capable of reaching a similar precision to other computationally more complex algorithms but reducing its size from 10 to 800 times. Finally, experiments show that our method can obt…
An Optimized Roadside Units (RSU) Placement for Delay-Sensitive Applications in Vehicular Networks
International audience; Over the last few years, a lot of applications have been developed for Vehicular Ad Hoc NETworks (VANETs) to exchange information between vehicles. However, VANET is basically a Delay Tolerant Network (DTN) characterized by intermittent connectivity, long delays and message losses especially in low density regions [1]. Thus, VANET requires the use of an infrastructure such as Roadside Units (RSUs) that permits to enhance the network connectivity. Nevertheless, due to their deployment cost, RSUs need to be optimally deployed. Hence, the main objective of this work is to provide an optimized RSUs placement for delay-sensitive applications in vehicular networks that imp…
An Online Time Warping based Map Matching for Vulnerable Road Users’ Safety
International audience; High penetration rate of Smartphones and their increased capabilities to sense, compute, store and communicate have made the devices vital components of intelligent transportation systems. However, their GPS positions accuracy remains insufficient for a lot of location-based applications especially traffic safety ones. In this paper, we developed a new algorithm which is able to improve smartphones GPS accuracy for vulnerable road users' traffic safety. It is a two-stage algorithm: in the first stage GPS readings obtained from smartphones are passed through Kalman filter to smooth deviated reading. Then an adaptive online time warping based map matching is applied to…
A2Ba: Adaptive Background Modelling for Visual Aerial Surveillance Conditions
International audience; Background modelling algorithms are widely used to define a part of an image that most time remains stationary in a video. In surveillance tasks, this model helps to recognize those outlier objects in an area under monitoring. Set up a background model on mobile platforms (UAVs, intelligent cars, etc.) is a challenging task due camera motion when images are acquired. In this paper, we propose A2Ba, a robust method to support instabilities caused by aerial images fusing different information about image motion. We used frame difference as first approximation, then age of pixels is estimated. This latter gives us an invariability level of a pixel over time. Gradient di…
An environment based approach for the ant colony convergence
Abstract Ant colony optimization (ACO) algorithms are a bio inspired solutions which have been very successful in combinatorial problem solving, also known as NP-hard problems, including transportation system optimization. As opposed to exact methods, which could give the best results of a tested problem, this meta-heuristics is based on the stochastic logic but not on theoretical mathematics demonstration (or only on certain well defined applications). According to this, the weak point of this meta-heuristics is his convergence, its termination condition. We can finds many different termination criteria in the scientific literature, yet most of them are costly in resources and unsuitable f…
An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based Smart Grid
International audience; The secure multidimensional data aggregation (MDA) has been widely investigated in smart grid for smart cities. However, previous proposals use heavy computation operations either to encrypt or to decrypt the multidimensional data. Moreover, previous fault-tolerant mechanisms lead to an important computation cost, and also a high communication cost when considering a separate identification phase. In this article, we propose an efficient and secure MDA scheme, named ESMA. Unlike existing schemes, the multidimensional data in ESMA are structured and encrypted into a single Paillier ciphertext and thereafter, the data are efficiently decrypted. For privacy preserving, …
Characterisation and physico-chemical predictive modelling of Lithium-ion battery cells aging
An accurate and efficient collaborative intrusion detection framework to secure vehicular networks
Display Omitted We design and implement an accurate and lightweight intrusion detection framework, called AECFV.AECFV aims to protect the vehicular ad hoc networks (VANETs) against the most dangerous attacks that could occurred on this network.AECFV take into account the VANET's characteristics such as high node's mobility and rapid topology change.AECFV exhibits a high detection rate, low false positive rate, faster attack detection, and lower communication overhead. The advancement of wireless communication leads researchers to develop and conceive the idea of vehicular networks, also known as vehicular ad hoc networks (VANETs). Security in such network is mandatory due to a vital informa…
A Green Mesh Routers' Placement to Ensure Small Cells Backhauling in 5G Networks
International audience; The wireless industry is preparing the fifth generation wireless systems with several requirements regarding capacity and coverage area. A promising solution to meet this challenge is a densification of the network via a large scale deployment of small cells from different sizes. The advantage here is that small cells are easy to deploy and cost-efficient compared to macro base stations. However, the challenge is to ensure a reliable backhaul links. Mesh routers backhauling is one of the candidate solutions here, since it is easy to deploy, doesn't use wired connections between locations and cost-efficient. Nevertheless, the issue is to deploy routers in the suitable…
A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography
International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…
Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids
Modern power systems are continuously exposed to malicious cyber-attacks. Analyzing industrial control system (ICS) traffic data plays a central role in detecting and defending against cyber-attacks. Detection approaches based on system modeling require effectively modeling the complex behavior of the critical infrastructures, which remains a challenge, especially for large-scale systems. Alternatively, data-driven approaches which rely on data collected from the inspected system have become appealing due to the availability of big data that supports machine learning methods to achieve outstanding performance. This chapter presents an enhanced cyber-attack detection strategy using unlabeled…
Call admission control scheme using borrowable guard channels and prioritizing fresh calls retrials in small cell networks
International audience; Recent trends in mobile cellular networks turn towards deployment of Small Cell Networks (SCNs), where, the cell size gets smaller, and thus the number of subscribers served in a cell will be relatively smaller, such that traffic models with a finite source of subscribers should be considered. Smaller cells cause the mobile subscribers to cross several cells during an ongoing conversation resulting in frequent handovers. Most of works dealing with Call Admission Control (CAC) problems based on guard channels scheme in cellular mobile networks consider models without retrials (reapeted calls phenomenon). However, almost all existing works which take into account retri…
Véhicule connecté : architectures, normes,défis et solutions
International audience; A connected vehicle network can vastly improve our transportation system in the aeras of safety, mobility and environment. This technologie provides connectivity among vehicles to enable crash prevention and between vehicles and the infrastructure to enable safety, mobility, and environmental benefits. This paper provides an overview of connected vehicles technology, the related challenges, projects and standardization activities.
A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks
International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…