0000000000139615

AUTHOR

Ahmad Khalil

showing 8 related works from this author

Fuzzy Logic based model for self-optimizing energy consumption in IoT environment

2021

Energy optimization is essential in IoT environments due to energy constraints for some IoT components. In fact, energy consumption has a direct impact on IoT system lifetime, which represents an important Quality of Service (QoS) parameter for IoT environments. In order to extend the IoT system lifetime, energy consumption optimization should be considered in several IoT components. In this paper, we specify an energy self-optimizing mechanism allowing to minimize data transmission energy consumption of IoT objects. This mechanism enables selecting specific objects to send the desired data while minimizing the energy consumed for the corresponding communication. Our proposal is made of a M…

Computer scienceQuality of serviceDistributed computingContext (language use)Energy consumptionObject (computer science)Energy minimizationFuzzy logicEnergy (signal processing)Data transmission2021 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

Gestion du niveau de service dans l’Internet des objets (IdO)

2020

International audience

[INFO]Computer Science [cs][INFO] Computer Science [cs]ComputingMilieux_MISCELLANEOUS
researchProduct

Service level guarantee framework for IoT environments

2017

Nowadays, providing IoT environments with service level guarantee is a challenging task. We propose a framework for IoT service level guarantee thanks to several specific Service Level Agreements (SLAs) for IoT environments. We specify different SLAs for each entity contributing in our IoT architecture in order to conclude a global SLA called IoT-SLA (iSLA). These different SLAs enable IoT service provision with Quality of Service (QoS) guarantee. Achieving this guarantee requires several communications and interactions between the components of the proposed IoT architecture. These interactions allow an IoT Service Provider (IoT-SP) to conclude the iSLA with an IoT Client (IoT-C). We specif…

business.industryComputer scienceQuality of service020206 networking & telecommunications02 engineering and technologyService providerTask (project management)Order (business)Service level0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessInternet of ThingsComputer networkProceedings of the 1st International Conference on Internet of Things and Machine Learning
researchProduct

Fuzzy Logic Based Security Trust Evaluation for IoT Environments

2019

In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…

Computer scienceContext (language use)02 engineering and technology[INFO] Computer Science [cs]TrustComputer securitycomputer.software_genreFuzzy logicFuzzy LogicFactor (programming language)Node (computer science)0202 electrical engineering electronic engineering information engineeringcomputer.programming_languagePrivacy.[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industry020206 networking & telecommunicationsInternet of Things (IoT)SecurityKey (cryptography)020201 artificial intelligence & image processingThe InternetbusinessPersonally identifiable informationcomputerPhysical security2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)
researchProduct

IoT-MAAC: Multiple Attribute Access Control for IoT environments

2020

Access Control is an important security service that should be considered in IoT environments in order to offer reliable IoT services. Access control in IoT environments concerns not only the access of IoT users to IoT services and objects, but also the access of IoT objects to IoT gateways. In this paper, we specify an access control mechanism that considers the access of IoT objects to IoT gateways in order to enhance the reliability of IoT data provided by the IoT objects. Our proposed access control mechanism, called IoT-MAAC (Multi Attribute Access Control), allows retrieving requested data from the most reliable and secured IoT objects among the available objects in the IoT environmen…

Trust levelService Level Agreements[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Computer sciencebusiness.industryReliability (computer networking)Access ControlIoT environments020206 networking & telecommunicationsAccess control02 engineering and technology[INFO] Computer Science [cs]Security service0202 electrical engineering electronic engineering information engineeringSecurity020201 artificial intelligence & image processingInternet of ThingsbusinessComputer networkMultiple attribute
researchProduct

QBAIoT: QoS Based Access for IoT Environments

2018

[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]
researchProduct

Towards Service Level Guarantee within IoT Sensing Layer

2019

IoT[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Service LevelQBAIoTQoSIoT objectsSlotted CSMA/CAIoT Gateway
researchProduct

Autonomous management of Quality of Service and security in an Internet of Things environment

2019

Nowadays, the Internet of Things (IoT) is becoming important in our daily lives thanks to technological advances. This paradigm aims to improve the quality of human life through automating several tasks. In this context, service level guarantee within IoT environments is a major challenge while considering a massive deployment of IoT applications and services as well as extending their usage to different domains. The IoT service level can be characterized in two parts: Quality of Service (QoS) and security. Moreover, this service level must be managed in an autonomic manner within the IoT environment given the heterogeneity and the size of its infrastructure making it difficult, even imposs…

Internet of thingsIoT-MAACQualité de service[INFO.INFO-CY] Computer Science [cs]/Computers and Society [cs.CY]Quality of serviceInternet des objetsGestion autonomeAutonomic ComputingSecurityQBAIoTSécurité
researchProduct