0000000000801854

AUTHOR

Sidi-mohammed Senouci

showing 56 related works from this author

On-Demand Security Framework for 5GB Vehicular Networks

2023

Building accurate Machine Learning (ML) at-tack detection models for 5G and Beyond (5GB) vehicular networks requires collaboration between Vehicle-to-Everything (V2X) nodes. However, while operating collaboratively, ensuring the ML model’s security and data privacy is challenging. To this end, this article proposes a secure and privacy-preservation on-demand framework for building attack-detection ML models for 5GB vehicular networks. The proposed framework emerged from combining 5GB technologies, namely, Federated Learning (FL), blockchain, and smart contracts to ensure fair and trustedinteractions between FL servers (edge nodes) with FL workers (vehicles). Moreover, it also provides an ef…

—5G and Beyond Vehicular Networks: Computer science [C05] [Engineering computing & technology]Blockchain[SPI] Engineering Sciences [physics]Security and Privacy: Sciences informatiques [C05] [Ingénierie informatique & technologie]Federated Learning5G and Beyond Vehicular Networks
researchProduct

dSDiVN: A Distributed Software-Defined Networking Architecture for Infrastructure-Less Vehicular Networks

2017

In the last few years, the emerging network architecture paradigm of Software-Defined Networking (SDN), has become one of the most important technology to manage large scale networks such as Vehicular Ad-hoc Networks (VANETs). Recently, several works have shown interest in the use of SDN paradigm in VANETs. SDN brings flexibility, scalability and management facility to current VANETs. However, almost all of proposed Software-Defined VANET (SDVN) architectures are infrastructure-based. This paper will focus on how to enable SDN in infrastructure-less vehicular environments. For this aim, we propose a novel distributed SDN-based architecture for uncovered infrastructure-less vehicular scenari…

Delay-tolerant networkingFlexibility (engineering)Network architectureVehicular ad hoc networkbusiness.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineering02 engineering and technology0203 mechanical engineeringScalability0202 electrical engineering electronic engineering information engineeringArchitecturebusinessSoftware-defined networkingComputer networkActive networking
researchProduct

A secure intersection-based routing protocol for data collection in urban vehicular networks

2014

Data routing has gained great intention since the appearance of Vehicular Networks (VANETs). However, in the presence of attackers, reliable and trustworthy operations in such networks become impossible without securing routing protocols. In this paper, we target to study and design a secure routing protocol S-GyTAR for vehicular environments. Several kinds of routing techniques are proposed in the literature and could be classified into topology-based or position-based strategies. Position-based is the most investigated strategy in vehicular networks due to the unique characteristics of such networks. For this reason, this work is based on the well-known intersection-based routing protocol…

Routing protocolDynamic Source RoutingWireless ad hoc networkComputer scienceEqual-cost multi-path routingDistributed computingEnhanced Interior Gateway Routing ProtocolWireless Routing ProtocolGeographic routinglaw.inventionRouting Information Protocol[SPI]Engineering Sciences [physics]RelaylawDestination-Sequenced Distance Vector routingComputingMilieux_MISCELLANEOUSHierarchical routingStatic routingZone Routing ProtocolVehicular ad hoc networkAdaptive quality of service multi-hop routingbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPolicy-based routingAd hoc wireless distribution serviceDistance-vector routing protocolOptimized Link State Routing ProtocolLink-state routing protocolInterior gateway protocolMultipath routingbusinessComputer network2014 IEEE Global Communications Conference
researchProduct

Optimization of Data Harvesters Deployment in an Urban Areas for an Emergency Scenario

2013

International audience; Since its appearance in the VANETs research community, data collection where vehicles have to explore an area and collect various local data, brings various issues and challenges. Some architectures were proposed to meet data collection requirements. They can be classified into two categories: Decentralized and Centralized self-organizing where different components and techniques are used depending on the application type. In this paper, we treat time-constrained applications in the context of search and rescue missions. For this reason, we propose a centralized architecture where a central unit plans and manages a set of vehicles namely harvesters to get a clear ove…

OptimizationMathematical optimizationVANETOperations researchComputer scienceHeuristic (computer science)[SPI] Engineering Sciences [physics]Search and Rescue050801 communication & media studies02 engineering and technologyTopology[SPI]Engineering Sciences [physics]0508 media and communications11. Sustainability0202 electrical engineering electronic engineering information engineeringHeuristic algorithmsLocal search (optimization)Greedy algorithmMetaheuristicHarvestersGreedy randomized adaptive search procedureIncremental heuristic searchbusiness.industryData Collection05 social sciencesVehicles020206 networking & telecommunicationsRoadsEmergencyBeam searchbusinessBismuthVariable neighborhood search
researchProduct

MCMIPv6: Multicast Configuration-based Mobile IPv6 protocol

2010

International audience; Mobile IPv6 (MIPv6) and its basic extension for network mobility NEMO were initially designed to manage the mobility of device users and networks respectively while maintaining a permanent IP address. Nevertheless, the different MIPv6's experiments have shown many lacks in case of high mobility of nodes such as in vehicular networks. To overcome these lacks, many solutions have been proposed by the research community. The most famous ones are HMIPv6 and FMIPv6 tackling each a specific issue. On the one hand, FMIPv6 introduces a solution to effectively minimize the L2/L3 latency and avoid the packets losses during the handover procedure. On the other hand, HMIPv6 is e…

Mobility modelVehicular ad hoc networkMulticastComputer sciencebusiness.industryNetwork packetComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMobile computing020206 networking & telecommunications02 engineering and technology[SPI]Engineering Sciences [physics]Stateful firewallMobile IP0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessMobility managementComputingMilieux_MISCELLANEOUSComputer network
researchProduct

A distributed detection and prevention scheme from malicious nodes in vehicular networks

2016

Summary Vehicular environments still remain vulnerable to various potential attacks because of continuous interactions and information exchange between vehicles despite the deployment of authentication techniques by communication standards. Therefore, an authenticated node with a certificate could initiate an attack while complying with implemented protocols. Some mechanisms were proposed to enhance communication technologies, but none of them was able to anticipate nodes' behavior. They also mismanage oscillating vehicles, because they evict them automatically after misbehaving. In this paper, we propose a preventive mechanism, namely, Intrusion Prevention and Detection System (IPDS), able…

AuthenticationVehicular ad hoc networkComputer Networks and CommunicationsComputer sciencebusiness.industryNode (networking)020206 networking & telecommunications02 engineering and technologyKalman filterCertificateComputer securitycomputer.software_genreSoftware deployment0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingElectrical and Electronic EngineeringRouting (electronic design automation)businesscomputerInformation exchangeComputer networkInternational Journal of Communication Systems
researchProduct

A hybrid algorithm for planning public charging stations

2014

International audience; Green mobility solutions are receiving currently an enormous attention. Indeed, during last years, electric vehicles, being part of the field of the smart-grid, entered the automobile market of the whole world. This technology requires an effective deployment of charging stations of electric refill since the main problem in this system remains over the duration of refill of the batteries. In this work, we propose an optimized algorithm to locate electric charging stations. The main task of the algorithm is to find the best site of charging stations locations so as to minimize loss on the way to the charging station, as well as minimize investment cost, we take into a…

OptimizationClustering algorithmsComputer science[SPI] Engineering Sciences [physics]Real-time computinggenetic optimizationSmart-Gridk-means clustringGenetic algorithmsHybrid algorithmCharging stationCharging stations[SPI]Engineering Sciences [physics]Smart gridMathematical modelWork (electrical)Software deploymentHardware_GENERALGenetic algorithmGeneticsDuration (project management)InvestmentCluster analysisSimulationelectric vehicles
researchProduct

Energy-aware design for wireless mesh networks

2014

International audience; Wireless mesh networks (WMNs) are the next step in the development of the wireless architecture, delivering wireless services for a large variety of users in personal, local, campus, and metropolitan areas. Energy efficiency solutions are becoming more vital for both local access networks and wireless networks and Green IT has attracted a considerable attention. However, the application of green network for wireless mesh networks has seldom been described in the literature. However, WMNs infrastructure devices are always active. Thus, during lower traffic periods the energy consumption is the same as in busy hours, while it would be possible to save a large amount of…

Wi-Fi arrayComputer scienceWireless communication7. Clean energy[SPI]Engineering Sciences [physics]Mathematical modelPower ManagementSleep StateGreen Networking11. SustainabilityWireless mesh networkbusiness.industryService setWireless networkComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnergy SavingWireless WANOrder One Network ProtocolLogic gatesWMNEnergy consumptionTelecommunication trafficKey distribution in wireless sensor networksEnergy efficiencyCities and townsbusinessMunicipal wireless networkComputer network
researchProduct

Sustainable Transportation Management System for a Fleet of Electric Vehicles

2015

In the last few years, significant efforts have been devoted to developing intelligent and sustainable transportation to address pollution problems and fuel shortages. Transportation agencies in various countries, along with several standardization organizations, have proposed different types of energy sources (such as hydrogen, biodiesel, electric, and hybrid technologies) as alternatives to fossil fuel to achieve a more ecofriendly and sustainable environment. However, to achieve this goal, there are significant challenges that still need to be addressed. We present a survey on sustainable transportation systems that aim to reduce pollution and greenhouse gas emissions. We describe the ar…

EngineeringStandardizationbusiness.industryMechanical EngineeringEnvironmental economicsGreen vehicleComputer Science ApplicationsTransport engineeringSustainable transportAutomotive EngineeringManagement systemFuel efficiencyElectricityEnergy sourcebusinessFleet managementIEEE Transactions on Intelligent Transportation Systems
researchProduct

PV-Alert: A fog-based architecture for safeguarding vulnerable road users

2017

International audience; High volumes of pedestrians, cyclists and other vulnerable road users (VRUs) have much higher casualty rates per mile; not surprising given their lack of protection from an accident. In order to alleviate the problem, sensing capabilities of smartphones can be used to detect, warn and safeguard these road users. In this research we propose an infrastructure-less fog-based architecture named PV-Alert (Pedestrian-Vehicle Alert) where fog nodes process delay sensitive data obtained from smartphones for alerting pedestrians and drivers before sending the data to the cloud for further analysis. Fog computing is considered in developing the architecture since it is an emer…

Computer science[SPI] Engineering Sciences [physics]Reliability (computer networking)mobile computingLatency (audio)traffic engineering computingCloud computing02 engineering and technologyFog ComputingComputer securitycomputer.software_genreroad vehicles[SPI]Engineering Sciences [physics]Low Latency0502 economics and businessPedestrian Safety0202 electrical engineering electronic engineering information engineeringWirelessComputer architectureArchitecturewireless LANEdge computing050210 logistics & transportationbusiness.industry05 social sciencesLocation awarenessroad traffic020206 networking & telecommunicationsVehiclesEdge computingsmart phonesVulnerable Road UsersRoadsroad accidentsCrowd sensingAccidentsScalabilitymobile radioSafetybusinessroad safetycomputer
researchProduct

Col : A Data Collection Protocol for Vanet

2012

International audience; In this paper, we present a protocol to collect data within a vehicular ad hoc network (VANET). In spite of the intrinsic dynamic of such network, our protocol simultaneously offers three relevant properties: (1) It allows any vehicle to collect data beyond its direct neighborhood (i.e., vehicles within direct communication range) using vehicle-to-vehicle communications only (i.e., the infrastructure is not required); (2) It tolerates possible network partitions; (3) It works on demand and stops when the data collection is achieved. To the best of our knowledge, this is the first collect protocol having these three characteristics. All that is chiefly obtained thanks…

data collection protocolVehicular communication systemsVANETCorrectnessnetwork operator antComputer sciencedata acquisitionDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]self-stabilization area02 engineering and technologyVehicle dynamics[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Transient analysis[SPI]Engineering Sciences [physics]0203 mechanical engineeringvehicular ad hoc networkvehicle to vehicle communication0202 electrical engineering electronic engineering information engineeringAlgorithm design and analysisHeuristic algorithmsCOL algorithmProtocol (object-oriented programming)ComputingMilieux_MISCELLANEOUSAirplug software distributionVehicular ad hoc networkData collectionbusiness.industryNetwork partitionnetwork partition020206 networking & telecommunications020302 automobile design & engineeringVehiclesSoftware distributionRoadsAlgorithm designvehicular ad hoc networksbusinessProtocolsComputer network
researchProduct

A Geographical Self-Organizing Approach for Vehicular Networks

2012

Cooperative vehicular networks have always been considered as the perfect way to bring more comfort to the passengers and more safety to the human life. Thus, research community and governmental organizations are interested to study and deploy these networks. The vehicular networks principle is connecting vehicles to each other and to existing infrastructure. However, their industrialization faces some challenges: (i) high mobility, (ii) frequently partitioned network, (iii) geographically constrained topology, and (iv) scalability. Therefore, in contrast to traditional networks, vehicular network protocols focus on both achieving adequate QoS level and reducing overhead. Achieving these tw…

Self-organizationVehicular ad hoc network[SPI] Engineering Sciences [physics]Computer sciencebusiness.industryQuality of serviceself-organizationvirtual backboneperformance evaluationScalabilityKey (cryptography)Overhead (computing)vehicular networksElectrical and Electronic EngineeringCommunications protocolbusinessProtocol (object-oriented programming)analytical study.clusteringComputer networkJournal of Communications
researchProduct

Secure and efficient verification for data aggregation in wireless sensor networks

2017

Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting topics in the field of Information and Communications Technology. Covering a wide range of applications, wireless sensor networks (WSNs) can play an important role in IoT by seamless integration among thousands of sensors. The benefits of using WSN in IoT include the integrity, scalability, robustness, and easiness in deployment. In WSNs, data aggregation is a famous technique, which, on one hand, plays an essential role in energy preservation and, on the other hand, makes the network prone to different kinds of attacks. The detection of false data injection and impersonation attacks is one of the majo…

021110 strategic defence & security studiesComputer Networks and Communicationsbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS0211 other engineering and technologiesEarly detection020206 networking & telecommunications02 engineering and technologyImpersonation attackComputer Science ApplicationsData aggregatorRobustness (computer science)Information and Communications TechnologySoftware deploymentScalability0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer networkInternational Journal of Network Management
researchProduct

Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments

2020

Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…

PROTOCOLSCRYPTOGRAPHYComputer Networks and CommunicationsComputer scienceGROUP COMMUNICATIONKey distributionCore networkRESEAU INFORMATIQUEAccess control02 engineering and technologySCALABILITYTECHNOLOGIE SANS FIL[SPI]Engineering Sciences [physics][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]TELECOMMUNICATIONForward secrecy0202 electrical engineering electronic engineering information engineeringRekeyingINTERNET OF THINGSElectrical and Electronic EngineeringINTERNETSECURITEDYNAMIC ENVIRONMENTSECURITYIOTTRAITEMENT DES DONNEESbusiness.industryKey distribution center020206 networking & telecommunicationsWIRELESS SENSOR NETWORKSRESEAU DE TELECOMMUNICATIONSGROUP KEY MANAGEMENTINFORMATIQUECommunication in small groupsScalabilityARCHITECTURE CLIENT-SERVEURbusinessCOMPUTER ARCHITECTUREACCESS CONTROLComputer network
researchProduct

PRIVANET: An Efficient Pseudonym Changing and Management Framework for Vehicular Ad-Hoc Networks

2020

Protecting the location privacy is one of the main challenges in vehicular ad-hoc networks (VANETs). Although, standardization bodies, such as IEEE and ETSI, have adopted a pseudonym-based scheme as a solution for this problem, an efficient pseudonym changing and management is still an open issue. In this paper, we propose PRIVANET, a complete and efficient pseudonym changing and management framework. The PRIVANET has a hierarchical structure and considers the vehicular geographic area as a grid. Each cell of this grid contains one or many logical zones, called vehicular location privacy zones (VLPZs). These zones can easily be deployed over the widespread roadside infrastructures (RIs), su…

Structure (mathematical logic)Scheme (programming language)050210 logistics & transportationStandardizationComputer scienceStochastic modellingbusiness.industryWireless ad hoc networkMechanical Engineeringmedia_common.quotation_subjectComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciencesPseudonymGridComputer Science Applications0502 economics and businessAutomotive EngineeringbusinesscomputerComputer networkReputationmedia_commoncomputer.programming_languageIEEE Transactions on Intelligent Transportation Systems
researchProduct

MDP-Based Resource Allocation Scheme Towards a Vehicular Fog Computing with Energy Constraints

2018

As mobile applications deliver increasingly complex functionalities, the demands for even more intensive computation would quickly transcend energy capability of mobile devices. On one hand and in an attempt to address such issues, fog computing paradigm is introduced to mitigate the limited energy and computation resources available within constrained mobile devices, by moving computation resources closer to their users at the edge of the access network. On another hand, most of electric vehicles (EVs), with increasing computation, storage and energy capabilities, spend more than 90% of time on parking lots. In this paper, we conceive the basic idea of using the underutilized computation r…

Access network0203 mechanical engineeringComputer scienceDistributed computing020208 electrical & electronic engineering0202 electrical engineering electronic engineering information engineeringResource allocation020302 automobile design & engineering02 engineering and technologyEnhanced Data Rates for GSM EvolutionMarkov decision processMobile device2018 IEEE Global Communications Conference (GLOBECOM)
researchProduct

Combinatorial Double Auction Radio Resource Allocation Model in Crowd Networks

2018

International audience; Industrial Partners (IPs) with Mobile Network Operators (MNOs) are extending the mobile network infrastructure with Small Cells (SCs) in order to meet the growing mobile traffic demand. Due to the increasing number of telecommunication market competitors and the scarcity of radio resources, static sharing schemes are no more efficient. New dynamic schemes should be considered to meet both user expectations and economic success. In a crowd networking context, we propose in this work a dynamic radio resource scheme based on combinatorial double auctions. The participants in these auctions are the MNOs considered as buyers and the IPs, providers of SCs, considered as se…

Economic efficiencyBalanced budgetComputer scienceCognitive radiomedia_common.quotation_subject02 engineering and technologyIP networksScarcity[SPI]Engineering Sciences [physics]Order (exchange)0202 electrical engineering electronic engineering information engineeringCommon value auctionDouble auctionElasticity (economics)media_commonResource managementMarket clearingDynamic schedulingCost accounting020206 networking & telecommunicationsEnvironmental economicsElasticityElasticity (cloud computing)Incentive compatibilityCellular network020201 artificial intelligence & image processingPricing2018 IEEE Global Communications Conference (GLOBECOM)
researchProduct

How to prevent cyber-attacks in inter-vehicle communication network?

2015

In this work, we aim to secure communication in a vehicular network by providing a proactive mechanism that can detect and predict with a high accuracy the future behavior of malicious attacker. In fact, the mechanisms proposed in the literature consider only detection mechanisms and do not prevent attacks that may arise in the network. Simulation results show that our mechanism has a high detection rate, low false positive rate while generating a low communication overhead.

Vehicular ad hoc networkNetwork securitybusiness.industryComputer scienceMechanism (biology)Computer securitycomputer.software_genreTelecommunications networkSecure communicationOverhead (computing)False positive ratebusinesscomputerGame theoryComputer network2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS)
researchProduct

Background subtraction for aerial surveillance conditions

2014

International audience; The first step in a surveillance system is to create a representation of the environment. Background subtraction is widely used algorithm to define a part of an image that most time remains stationary in a video. In surveillance tasks, this model helps to recognize those outlier objects in an area under monitoring. Set up a background model on moving platforms (intelligent cars, UAVs, etc.) is a challenging task due camera motion when images are acquired. In this paper, we propose a method to support instabilities caused by aerial images fusing spatial and temporal information about image motion. We used frame difference as first approximation, then age of pixels is …

Background subtractionPixelbusiness.industryComputer science[SPI] Engineering Sciences [physics]ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONMotion (physics)Image (mathematics)[SPI]Engineering Sciences [physics]Motion estimationOutlierComputer visionArtificial intelligencebusinessRepresentation (mathematics)Aerial imageComputingMilieux_MISCELLANEOUS
researchProduct

Recent advances on security and privacy in intelligent transportation systems (ITSs)

2019

Computer Networks and CommunicationsHardware and ArchitectureComputer scienceComputer securitycomputer.software_genrecomputerIntelligent transportation systemSoftwareAd Hoc Networks
researchProduct

New Optimization and Security Approaches to Enhance the Smart Grid Performance and Reliability

2016

International audience; Nowadays, the Smart Grid (SG) is becoming smarter thanks to the integration of different information and communication technologies to enhance the reliability and efficiency of the power grid. However, several issues should be met to ensure high SG performance. Among these issues, we cite the problem of electric vehicles (EVs) integration into the SG to avoid electricity intermittence due to the important load that EVs can create. Another issue is the SG communication network security that can be attempted by malicious intruders in order to create damages and make the power grid instable. In this context, we propose at a first level a Bayesian game-theory model that …

[ INFO ] Computer Science [cs]Computer scienceDistributed computing02 engineering and technologyIntrusion detection system[INFO] Computer Science [cs]Bayesian gameGame TheoryRobustness (computer science)Bayesian Nash Equilibrium0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]Smart GridChallengesIntrusion Detection System020203 distributed computingbusiness.industry020206 networking & telecommunicationsTelecommunications networkSmart gridInformation and Communications TechnologyElectricitybusinessGame theoryElectric VehiclesComputer network
researchProduct

HINTS: A novel approach for realistic simulations of vehicular communications

2012

One of the main challenges in the Vehicular Ad-Hoc Networks (VANETs) research domain is the simulation of vehicular communications using realistic mobility models. Several efforts have been put lately in this purpose; yet, the proposed models are either inappropriate, or carry significant disadvantages. In this paper, we propose a novel approach for realistic simulations in vehicular networks, inspired from the hierarchical video and image compression technique. We developed HINTS (Hybrid Integration of Network and Traffic Simulators), the correspondent platform, engendered from the integration of SUMO, a traffic simulator and NS-3, a network simulator after adding some supplemental modules…

Vehicular communication systemsImage codingMobility modelVehicular ad hoc networkComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSSimulationTraffic simulatorNetwork simulationImage compressionDomain (software engineering)2012 Global Information Infrastructure and Networking Symposium (GIIS)
researchProduct

Hpdm : A Hybrid Pseudonym Distribution Method for Vehicular Ad-Hoc Networks

2016

Abstract Protecting the location privacy of drivers is still one of the main challenges in Vehicular Ad-hoc Networks (VANETs). The changing of pseudonym is commonly accepted as a solution to this problem. The pseudonyms represent fake vehicle identifiers. Roadside Units (RSUs) play a central role in the existing pseudonyms distribution solutions. Indeed, the VANET area should totally be covered by RSUs in order to satisfy the demand of vehicles in terms of pseudonyms. However, the total coverage is costly and hard to be achieved, especially in the first phase of VANETs deployment. In addition, RSUs could be overloaded due to the large number of pseudonyms requests that could be received fro…

020203 distributed computingVehicular ad hoc networkLocation privacyWireless ad hoc networkComputer sciencebusiness.industry[SPI] Engineering Sciences [physics]ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPseudonyms distribution.020206 networking & telecommunications02 engineering and technologyPseudonymNetwork simulationIdentifier[SPI]Engineering Sciences [physics]Pseudonyms distribution0202 electrical engineering electronic engineering information engineeringSecurityComputingMilieux_COMPUTERSANDSOCIETYGeneral Earth and Planetary SciencesDistribution methodVANETsbusinessGeneral Environmental ScienceComputer network
researchProduct

Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology

2017

International audience; Advances in wireless communications and microelectronics have spearheaded the development of unmanned aerial vehicles (UAVs), which can be used to augment a ground network composed of sensors and/or vehicles in order to increase coverage, enhance the end-to-end delay, and improve data processing. While UAV-aided networks can potentially find applications in many areas, a number of issues, particularly security, have not been readily addressed. The intrusion detection system is the most commonly used technique to detect attackers. In this paper, we focus on addressing two main issues within the context of intrusion detection and attacker ejection in UAV-aided networks…

EngineeringAnomaly-based intrusion detection systemintrusion detection system (IDS)Context (language use)02 engineering and technologyIntrusion detection systemComputer securitycomputer.software_genreBayesian game[ SPI.GCIV.IT ] Engineering Sciences [physics]/Civil Engineering/Infrastructures de transportUtility[ SPI.NRJ ] Engineering Sciences [physics]/Electric power0202 electrical engineering electronic engineering information engineering[ SPI.GCIV ] Engineering Sciences [physics]/Civil Engineering[ SPI ] Engineering Sciences [physics]Overhead (computing)Network performanceunmanned aerial vehicles (UAVs)Ad HocBayesian gameVehicular ad hoc networkbusiness.industryMechanical EngineeringNode (networking)020206 networking & telecommunicationsComputer Science Applications[ SPI.TRON ] Engineering Sciences [physics]/ElectronicsEfficientAutomotive Engineeringintrusion ejection system (IES)020201 artificial intelligence & image processingVehicular NetworksWireless Sensor NetworksbusinesscomputerComputer network
researchProduct

A Sequential Game Approach for Computation-Offloading in an UAV Network

2017

International audience; Small drones are currently emerging as versatile nascent technology that can be used in exploration and surveillance missions. However, most of the underlying applications require very often complex and time-consuming calculations. Although, the limited resources available onboard the small drones, their mobility, the computation delays and energy consumption make the operation of these applications very challenging. Nevertheless, computation-offloading solutions provide feasible resolves to mitigate the issues facing these constrained devices. In this context, we address in this paper the problem of offloading highly intensive computation tasks, performed by a fleet…

020203 distributed computingSequential gameComputer scienceDistributed computingBase stations020206 networking & telecommunicationsContext (language use)Computational modelingServers02 engineering and technologyEnergy consumptionBase stationsymbols.namesake[SPI]Engineering Sciences [physics]Nash equilibriumServer0202 electrical engineering electronic engineering information engineeringsymbolsOverhead (computing)Computation offloadingDelaysGamesDrones
researchProduct

VLPZ: The Vehicular Location Privacy Zone

2016

International audience; One of the key challenges in the success of vehicular ad hoc networks (VANETs) is to consider the location privacy of drivers. Although, the pseudonym changing approach is suggested by standardization development organizations such as IEEE and ETSI, the development of an effective pseudonym changing strategy is still an open issue. The existing pseudonym changing strategies are either not effective to protect against the pseudonyms linking attacks or can have a negative impact on the VANETs’ applications. To address these issues, this paper proposes a new pseudonym changing strategy based on the Vehicular Location Privacy Zone (VLPZ), which is a roadside infrastructu…

StandardizationComputer scienceWireless ad hoc networkSecurity.02 engineering and technologyPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringVANETsGeneral Environmental ScienceLocation privacybiologybusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020302 automobile design & engineering020206 networking & telecommunicationsPseudonym ChangingTollMetric (mathematics)biology.proteinKey (cryptography)SecurityGeneral Earth and Planetary SciencesComputingMilieux_COMPUTERSANDSOCIETYbusinesscomputerAnonymityComputer network
researchProduct

An Optimized Roadside Units (RSU) Placement for Delay-Sensitive Applications in Vehicular Networks

2015

International audience; Over the last few years, a lot of applications have been developed for Vehicular Ad Hoc NETworks (VANETs) to exchange information between vehicles. However, VANET is basically a Delay Tolerant Network (DTN) characterized by intermittent connectivity, long delays and message losses especially in low density regions [1]. Thus, VANET requires the use of an infrastructure such as Roadside Units (RSUs) that permits to enhance the network connectivity. Nevertheless, due to their deployment cost, RSUs need to be optimally deployed. Hence, the main objective of this work is to provide an optimized RSUs placement for delay-sensitive applications in vehicular networks that imp…

Delay-tolerant networkingOptimization problemVehicular ad hoc networkmodelCovering location optimizationComputer sciencebusiness.industryWireless ad hoc networkDistributed computingcoveragedeployment cost[ SPI.TRON ] Engineering Sciences [physics]/ElectronicsframeworkGenetic algorithmgenetic algorithm[ SPI ] Engineering Sciences [physics]real-time applicationsbusinessDijkstra's algorithmComputer networkdelay constraints
researchProduct

An Online Time Warping based Map Matching for Vulnerable Road Users’ Safety

2018

International audience; High penetration rate of Smartphones and their increased capabilities to sense, compute, store and communicate have made the devices vital components of intelligent transportation systems. However, their GPS positions accuracy remains insufficient for a lot of location-based applications especially traffic safety ones. In this paper, we developed a new algorithm which is able to improve smartphones GPS accuracy for vulnerable road users' traffic safety. It is a two-stage algorithm: in the first stage GPS readings obtained from smartphones are passed through Kalman filter to smooth deviated reading. Then an adaptive online time warping based map matching is applied to…

Dynamic time warpingSimilarity (geometry)010504 meteorology & atmospheric sciencesComputer science[SPI] Engineering Sciences [physics]Vulnerable Road Users SafetyTime series analysisMap matching01 natural sciencesGPS Accuracy[SPI]Engineering Sciences [physics]Smart phonesGlobal Positioning System11. Sustainability0502 economics and businessHeuristic algorithmsComputer visionTime seriesIntelligent transportation systemReal-time systems0105 earth and related environmental sciencesOnline Time Warping050210 logistics & transportationbusiness.industry05 social sciencesKalman filterMap MatchingRoadsGlobal Positioning SystemArtificial intelligenceSafetybusinessKalman Filter
researchProduct

A2Ba: Adaptive Background Modelling for Visual Aerial Surveillance Conditions

2015

International audience; Background modelling algorithms are widely used to define a part of an image that most time remains stationary in a video. In surveillance tasks, this model helps to recognize those outlier objects in an area under monitoring. Set up a background model on mobile platforms (UAVs, intelligent cars, etc.) is a challenging task due camera motion when images are acquired. In this paper, we propose A2Ba, a robust method to support instabilities caused by aerial images fusing different information about image motion. We used frame difference as first approximation, then age of pixels is estimated. This latter gives us an invariability level of a pixel over time. Gradient di…

lcsh:Computer engineering. Computer hardwareComputer Networks and CommunicationsComputer sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONKDElcsh:TK7885-7895lcsh:TA168Computer Science Applicationsbackground modelling[SPI]Engineering Sciences [physics]Image processinglcsh:Systems engineeringControl and Systems Engineeringunmanned aerial vehicleComputer visionArtificial intelligenceGMMmoving objectsbusinessmobile observerSimulationInformation Systemsbackground subtraction
researchProduct

An environment based approach for the ant colony convergence

2020

Abstract Ant colony optimization (ACO) algorithms are a bio inspired solutions which have been very successful in combinatorial problem solving, also known as NP-hard problems, including transportation system optimization. As opposed to exact methods, which could give the best results of a tested problem, this meta-heuristics is based on the stochastic logic but not on theoretical mathematics demonstration (or only on certain well defined applications). According to this, the weak point of this meta-heuristics is his convergence, its termination condition. We can finds many different termination criteria in the scientific literature, yet most of them are costly in resources and unsuitable f…

Ant ColonyEnvironment approachMathematical optimization021103 operations researchComputer science[SPI] Engineering Sciences [physics]Ant colony optimization algorithms0211 other engineering and technologiesSystem optimization02 engineering and technologyAnt colonyStochastic logic[SPI]Engineering Sciences [physics]Order (exchange)Convergence (routing)0202 electrical engineering electronic engineering information engineeringDynamic convergenceGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingPoint (geometry)ComputingMilieux_MISCELLANEOUSGeneral Environmental Science
researchProduct

An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based Smart Grid

2021

International audience; The secure multidimensional data aggregation (MDA) has been widely investigated in smart grid for smart cities. However, previous proposals use heavy computation operations either to encrypt or to decrypt the multidimensional data. Moreover, previous fault-tolerant mechanisms lead to an important computation cost, and also a high communication cost when considering a separate identification phase. In this article, we propose an efficient and secure MDA scheme, named ESMA. Unlike existing schemes, the multidimensional data in ESMA are structured and encrypted into a single Paillier ciphertext and thereafter, the data are efficiently decrypted. For privacy preserving, …

Information privacysmart citiesComputer Networks and CommunicationsComputer scienceDistributed computingCryptography02 engineering and technologyEncryptionPaillier cryptosystem[SPI]Engineering Sciences [physics]Ciphertext0202 electrical engineering electronic engineering information engineeringAuthenticationbusiness.industry020208 electrical & electronic engineering020206 networking & telecommunicationssecurity and privacyComputer Science ApplicationsData aggregationsmart grid (SG)Smart gridHardware and ArchitectureSignal ProcessingScalabilityfog computingbusinessInformation Systems
researchProduct

An accurate and efficient collaborative intrusion detection framework to secure vehicular networks

2015

Display Omitted We design and implement an accurate and lightweight intrusion detection framework, called AECFV.AECFV aims to protect the vehicular ad hoc networks (VANETs) against the most dangerous attacks that could occurred on this network.AECFV take into account the VANET's characteristics such as high node's mobility and rapid topology change.AECFV exhibits a high detection rate, low false positive rate, faster attack detection, and lower communication overhead. The advancement of wireless communication leads researchers to develop and conceive the idea of vehicular networks, also known as vehicular ad hoc networks (VANETs). Security in such network is mandatory due to a vital informa…

Vehicular ad hoc networksEngineeringVehicular ad hoc networkOverheadGeneral Computer Sciencebusiness.industryWireless ad hoc networkIntrusion detection systemNode (networking)Detection rateIntrusion detection system[SPI]Engineering Sciences [physics]Control and Systems EngineeringWirelessOverhead (computing)False positive rateElectrical and Electronic EngineeringDetection timebusinessCluster analysisComputer networkVulnerability (computing)Computers & Electrical Engineering
researchProduct

A Green Mesh Routers' Placement to Ensure Small Cells Backhauling in 5G Networks

2017

International audience; The wireless industry is preparing the fifth generation wireless systems with several requirements regarding capacity and coverage area. A promising solution to meet this challenge is a densification of the network via a large scale deployment of small cells from different sizes. The advantage here is that small cells are easy to deploy and cost-efficient compared to macro base stations. However, the challenge is to ensure a reliable backhaul links. Mesh routers backhauling is one of the candidate solutions here, since it is easy to deploy, doesn't use wired connections between locations and cost-efficient. Nevertheless, the issue is to deploy routers in the suitable…

Load modelingSolar panelsComputer sciencebusiness.industryWireless communicationBase stations020302 automobile design & engineering020206 networking & telecommunications02 engineering and technologyGreen products7. Clean energyBackhaul (telecommunications)[SPI]Engineering Sciences [physics]Base stationSolar energy0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringWirelessInterferencebusiness5GComputer network2017 IEEE 86th Vehicular Technology Conference (VTC-Fall)
researchProduct

A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography

2015

International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…

Computer Networks and Communicationsbusiness.industryComputer scienceWireless sensor networks WSNsSimple power analysisSecure data aggregationHomomorphic encryptionCryptographyEncryptionHomomorphic encryptionPublic-key cryptography[SPI]Engineering Sciences [physics]Key distribution in wireless sensor networksStateful firewallHardware and ArchitectureOverhead (computing)businessSecurity levelWireless sensor networkSoftwareComputer networkAd Hoc Networks
researchProduct

Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids

2022

Modern power systems are continuously exposed to malicious cyber-attacks. Analyzing industrial control system (ICS) traffic data plays a central role in detecting and defending against cyber-attacks. Detection approaches based on system modeling require effectively modeling the complex behavior of the critical infrastructures, which remains a challenge, especially for large-scale systems. Alternatively, data-driven approaches which rely on data collected from the inspected system have become appealing due to the availability of big data that supports machine learning methods to achieve outstanding performance. This chapter presents an enhanced cyber-attack detection strategy using unlabeled…

Semi-supervised methods[SPI] Engineering Sciences [physics]Deep learningAnomaly detectionCyber-attack detectionProtocol IEC 104
researchProduct

Call admission control scheme using borrowable guard channels and prioritizing fresh calls retrials in small cell networks

2014

International audience; Recent trends in mobile cellular networks turn towards deployment of Small Cell Networks (SCNs), where, the cell size gets smaller, and thus the number of subscribers served in a cell will be relatively smaller, such that traffic models with a finite source of subscribers should be considered. Smaller cells cause the mobile subscribers to cross several cells during an ongoing conversation resulting in frequent handovers. Most of works dealing with Call Admission Control (CAC) problems based on guard channels scheme in cellular mobile networks consider models without retrials (reapeted calls phenomenon). However, almost all existing works which take into account retri…

education.field_of_studyQueueing theory[SPI] Engineering Sciences [physics]business.industryComputer scienceCall Admission ControlPopulationBlocking (statistics)[SPI]Engineering Sciences [physics]HandoverCellular networkStochastic Petri netSmall celleducationbusinessComputingMilieux_MISCELLANEOUSComputer network2014 Global Information Infrastructure and Networking Symposium (GIIS)
researchProduct

Véhicule connecté : architectures, normes,défis et solutions

2014

International audience; A connected vehicle network can vastly improve our transportation system in the aeras of safety, mobility and environment. This technologie provides connectivity among vehicles to enable crash prevention and between vehicles and the infrastructure to enable safety, mobility, and environmental benefits. This paper provides an overview of connected vehicles technology, the related challenges, projects and standardization activities.

[SPI]Engineering Sciences [physics]
researchProduct

A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

2017

International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer scienceWireless ad hoc networklocation privacy02 engineering and technologysecurityPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineeringpseudonym changing0202 electrical engineering electronic engineering information engineeringVANETsElectrical and Electronic EngineeringAuthenticationVehicular ad hoc networksAuthenticationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineeringRoadsSoftware deploymentPrivacyInitial phaseComputingMilieux_COMPUTERSANDSOCIETYSafetycomputerCryptography and Security (cs.CR)
researchProduct

Dissemination protocol for Heterogeneous Cooperative Vehicular Networks

2012

International audience; The difficulties associated with network connectivity, unreliable channels, and city environment characteristics make data dissemination task in vehicular urban networks a real challenge. Recently, some interesting solutions have been proposed to perform data dissemination in this environment. Starting from the analysis of these solutions, we present a new dissemination protocol named DHVN (Dissemination protocol for Heterogeneous Cooperative Vehicular Networks) that considers: (i) roads topology, (ii) network connectivity and possible partitioning in case of low traffic density, and (iii) heterogeneous communication capabilities of the vehicles. We compare our proto…

Scheme (programming language)050210 logistics & transportationVehicular ad hoc networkComputer sciencebusiness.industryDistributed computing05 social sciences020206 networking & telecommunicationsTopology (electrical circuits)02 engineering and technologyNetwork connectivityTask (computing)[SPI]Engineering Sciences [physics]0502 economics and business0202 electrical engineering electronic engineering information engineeringBandwidth (computing)businesscomputerDisseminationProtocol (object-oriented programming)computer.programming_languageComputer network
researchProduct

Toward a lightweight and efficient UAV‐aided VANET

2019

International audience; Connectivity in a smart vehicular network is quite sensitive and highly affected by its dynamic network topology. Issues related to the intermittent nature of connectivity may arise due to the high mobility of nodes and network heterogeneity. In sparse areas, a vehicular network is basically a disruption‐tolerant network suffering from frequent disconnections, long delays, and messages loss. Facing these issues, and specifically for time‐sensitive applications, Unmanned Aerial Vehicle (UAV) can provide valuable assistance to Vehicular Ad Hoc Network (VANET) by assuming a relay node role between disconnected segments in the road. In such scenarios, effective communica…

Vehicular ad hoc networkbusiness.industryComputer science020302 automobile design & engineering020206 networking & telecommunicationsComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technology7. Clean energy[SPI]Engineering Sciences [physics]0203 mechanical engineeringEmbedded system0202 electrical engineering electronic engineering information engineeringElectrical and Electronic Engineeringbusiness
researchProduct

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct

Clustering-Based Algorithm for Connectivity Maintenance in Vehicular Ad-Hoc Networks

2014

International audience; Among recent advances in wireless communication technologies' field, Vehicular Ad-hoc Networks (VANETs) have drawn the attention of both academic and industry researchers due to their potential applications including driving safety, entertainment, emergency applications, and content sharing. VANET networks are characterized by their high mobile topology changes. Clustering is one of the control schemes used to make this global topology less dynamic. It allows the formation of dynamic virtual backbone used to organize the medium access, to support quality of service and to simplify routing. Mainly, nodes are organized into clusters with at least one cluster head (CH) …

NS2Vehicular ad hoc networkAdaptive quality of service multi-hop routingbusiness.industryComputer scienceWireless ad hoc networkVehicular ad-hoc networksQuality of serviceNode (networking)Distributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAd hoc wireless distribution serviceconnectivity maintenance[SPI]Engineering Sciences [physics]Optimized Link State Routing ProtocolbusinessCluster analysisComputingMilieux_MISCELLANEOUSComputer networkcluster stabilityclustering
researchProduct

Network Connectivity and Area Coverage for UAV Fleet Mobility Model with Energy Constraint

2016

International audience; Our main focus through the present paper is on developing an original distributed mobility model for autonomous fleet of interconnected UAVs (Unmanned Aerial Vehicles) performing an area exploration mission. The UAVs, equipped with wireless ad-hoc capabilities, are required to optimally explore an area while maintaining connectivity with their neighboring UAVs and the base station. Because energy is a scarce resource, especially for UAVs, its wise management is quite beneficial for the network lifetime and mission success. Hence, the proposed mobility model, compared to other models in the literature, is the first to ever include the remaining energy level as decisio…

Mobility modelWireless ad hoc networkComputer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]050801 communication & media studiesComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyBase station0508 media and communicationsResource (project management)DTN (Delay Tolerant Networks)0202 electrical engineering electronic engineering information engineeringWireless[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryMobility Model05 social sciences020206 networking & telecommunicationsAdhoc NetworksAlgorithm designbusinessFocus (optics)UAVs (Unmanned Aerial Vehicles)Energy (signal processing)Computer network
researchProduct

EV-planning: Electric vehicle itinerary planning

2014

International audience; In the latest few years, lot of efforts have been done to pave the way to sustainable mobility, in order to solve pollution problems and fuel shortage. The use of electric vehicles (EV) is considered as one of the best ecologic and economic solution. However, autonomy barriers and limitations slow the progress and the deployment of this technology. In this paper, we propose an advanced electric vehicles' fleet management architecture. This architecture considers the most important factors that can affect the traveling mode of electric vehicles, in order to offer different services to fleet management companies for an efficient monitoring and management of their fleet…

Service (systems architecture)Engineeringbusiness.product_category[SPI] Engineering Sciences [physics]Economicstraffic engineering computingServers0102 computer and information sciences02 engineering and technologyElectric vehicle01 natural sciences7. Clean energyTransport engineeringsecondary cellsUploadBatteries[SPI]Engineering Sciences [physics]ServerGlobal Positioning System11. SustainabilityElectric vehicle0202 electrical engineering electronic engineering information engineeringComputer architectureComputingMilieux_MISCELLANEOUSelectric vehiclesItinerary planningInternetGreen services and vehicular communicationsbusiness.industry020208 electrical & electronic engineeringroad trafficpower consumptionElectric charging stationsRoadselectric power consumption and computation010201 computation theory & mathematics13. Climate actionSoftware deploymentGlobal Positioning SystemNet-work architectureFleet managementElectric powerbusinessFleet management
researchProduct

An optimization location scheme for electric charging stations

2013

International audience; Due to environmental issues, electric mobility is one of the mobility alternatives that are receiving a huge attention nowadays. In fact, in the last few years electric vehicles have entered the world's car market. This revolutionary technology requires a fast deployment of electric charging stations since the key issue in this system is recharging the batteries. In this work, we propose an optimized algorithm to locate electric-vehicles charging stations. Different factors and limitations are considered and a real case study is given as an application. We first determine the appropriate strict constraints and cost of charging stations' location; and then we propose …

Engineeringbusiness.product_categorysmart-gridHeuristic (computer science)business.industryReal-time computingElectrical engineeringelectric vehicleCharging station[SPI]Engineering Sciences [physics]Smart gridplacement optimizationHardware_GENERALinvestment costElectric vehicleConvergence (routing)Genetic algorithmKey (cryptography)Dendrogramgenetic algorithmcharging stationbusinessPremature convergencecapacity constraint
researchProduct

Smart Grid Security: A new Approach to Detect Intruders in a Smart Grid Neighborhood Area Network

2016

International audience; In this paper, we propose an efficient and lightweight attack detection mechanism for a smart grid Neighborhood Area Network (NAN) that combine between distributed and centralized intrusion detection. A NAN includes the customers' appliances, smart meters and collectors. The smart meters measure the power consumption of each appliance and the collectors aggregate the measures and forward them to the control center for analysis. Intrusion Detection System (IDS) agents, proposed in our framework, run in a distributed fashion at smart meters level and in a centralized fashion at collector and control center nodes. A combination between a rule-based detection and a learn…

Intruder detection[ INFO ] Computer Science [cs]Computer science[SPI] Engineering Sciences [physics][ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Denial-of-service attack02 engineering and technologyIntrusion detection system[INFO] Computer Science [cs]Resource exhaustion0202 electrical engineering electronic engineering information engineering[ SPI ] Engineering Sciences [physics]Neighborhood area networkSmart GridFalse data injection[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industrySmart grid security020208 electrical & electronic engineering020206 networking & telecommunicationsAttackGrid[SPI.TRON] Engineering Sciences [physics]/Electronics[ SPI.TRON ] Engineering Sciences [physics]/ElectronicsSmart gridDoSbusinessEnergy (signal processing)Computer networkEfficient energy use
researchProduct

Multi-agent control architecture for RFID cyberphysical robotic systems initial validation of tagged objects detection and identification using Playe…

2016

International audience; The objective of this paper is to describe and validate a multi-agent architecture proposed to control RFID Cyber-Physical Robotic Systems. This environment may contain human operators, robots (mobiles, manipulators, mobile manipulators, etc.), places (workrooms, walls, etc.) and other objects (tables, chairs, etc.). The proposed control architecture is composed of two types of agents dispatched on two levels. We find at the Organization level a Supervisory agent to allow operators to configure, manage and interact with the overall control system. At the Control level, we distinguish the Robots agents, to each robot (mobiles, manipulators or mobile manipulators) is a…

fiducial tagsComputer sciencemultiagent control architectureReal-time computing02 engineering and technologyRobot kinematicscyber-physical systemsCyber-physical systemPlayer/Stagerobot vicinity[SPI]Engineering Sciences [physics]mobile robotsrobot agentradiofrequency identificationRobot sensing systems0202 electrical engineering electronic engineering information engineering[ SPI ] Engineering Sciences [physics][INFO.INFO-RB]Computer Science [cs]/Robotics [cs.RO]supervisory agentFiducial interfaceRFID cyber-physical robotic systemsmanipulatorsRFIDmobile manipulatorsRobot kinematicsbusiness.industryRFID readershuman operators020208 electrical & electronic engineering[ INFO.INFO-RB ] Computer Science [cs]/Robotics [cs.RO]intelligent robotsObject recognitionObject (computer science)fiducial finderscontrol levelRobot controlCentralized databaseIdentification (information)Control systemEmbedded systemfiducial systemMultirobot systemsRobot020201 artificial intelligence & image processingRFID tagsbusinessFiducial marker
researchProduct

A Trusted Hybrid Learning Approach to Secure Edge Computing

2021

Securing edge computing has drawn much attention due to the vital role of edge computing in Fifth Generation (5G) wireless networks. Artificial Intelligence (AI) has been adopted to protect networks against attackers targeting the connected edge devices or the wireless channel. However, the proposed detection mechanisms could generate a high false detection rate, especially against unknown attacks defined as zero-day threats. Thereby, we propose and conceive a new hybrid learning security framework that combines the expertise of security experts and the strength of machine learning to protect the edge computing network from known and unknown attacks, while minimizing the false detection rat…

Intrustion Detection: Computer science [C05] [Engineering computing & technology]Monitoringbusiness.industryComputer scienceFeature extractionHybrid learningServersHybrid learning: Sciences informatiques [C05] [Ingénierie informatique & technologie]Computer Science ApplicationsImage edge detectionHuman-Computer Interaction[SPI]Engineering Sciences [physics]Hardware and ArchitectureServerSecurityEdge ComputingFeature extractionEnginesElectrical and Electronic Engineeringbusiness5GEdge computingComputer network
researchProduct

Theoretical Game Approach for Mobile Users Resource Management in a Vehicular Fog Computing Environment

2018

Vehicular Cloud Computing (VCC) is envisioned as a promising approach to increase computation capabilities of vehicle devices for emerging resource-hungry mobile applications. In this paper, we introduce the new concept of Vehicular Fog Computing (VFC). The Fog Computing (FC) paradigm evolved and is employed to enhance the quality of cloud computing services by extending it to the edge of the network using one or more collaborative end-user clients or near-user edge devices. The VFC is similar to the VCC concept but uses vehicles resources located at the edge of the network in order to serve only local on-demand mobile applications. The aim of this paper is to resolve the problem of admissi…

game theoryEdge deviceComputer science[SPI] Engineering Sciences [physics]Distributed computingmobile computingresource allocationCloud computing02 engineering and technologyFog ComputingVehicular Fog Computingdecision makingScheduling (computing)symbols.namesakeAuthor Keywords Cloud ComputingMobile applications0202 electrical engineering electronic engineering information engineeringResource managementEdge computing020203 distributed computingbusiness.industryQuality of service020208 electrical & electronic engineeringcloud computingComputational modelingAdmission controlEdge computingNash equilibriumPotential Game Theorysymbolsquality of servicevehicular ad hoc networksbusinessGamesGame theory
researchProduct

Elliptic Curve-Based Secure Multidimensional Aggregation for Smart Grid Communications

2017

In smart grid, data aggregation is considered as an essential paradigm in assessing information about current energy usage. To achieve the privacy-preserving goal, several homomorphic-based solutions have been proposed. However, these solutions either consider one-dimensional information or use costly pairing computation in order to ensure source authentication. In fact, smart grid data are likely to be multidimensional (e.g., time, purpose, and so on) for more accurate control. In addition, the aggregation node in smart grid needs to verify data that come from several smart meters in a residential area; hence, the verification must be cost-efficient. In this paper, we propose a scheme that…

Scheme (programming language)geographyTheoretical computer sciencegeography.geographical_feature_categoryComputer sciencebusiness.industryDistributed computingNode (networking)020208 electrical & electronic engineeringHomomorphic encryption020206 networking & telecommunications02 engineering and technologyEncryptionResidential areaSmart grid0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringElliptic curve cryptographybusinessInstrumentationcomputercomputer.programming_languageIEEE Sensors Journal
researchProduct

Green Fleet Management Architecture : Application to Economic Itineary Planning

2012

International audience; Over the last decade, great efforts are invested in reducing emissions of greenhouse gases at a world scale. We should therefore elaborate new global solutions to this type of pollution, in which fleets of vehicles are heavily contributing. In this paper, we propose a novel green architecture for global fleet management that considers the most important actors. The proposed architecture allows to collect useful information from several fleets of vehicles and their environment, and provides real-time services to companies that own one of these fleets. One important service is the calculation of economic itinerary. We propose a new "green" calculation method that is ba…

[SPI]Engineering Sciences [physics][SPI] Engineering Sciences [physics]
researchProduct

Energy-Aware Design for Wireless Mesh Networks

2014

International audience

[SPI]Engineering Sciences [physics][SPI] Engineering Sciences [physics]ComputingMilieux_MISCELLANEOUS
researchProduct

Utilisation De La Conduite En Convoi Pour La Conception De Nouveau Systèmes De Transports Innovants Pour La Livraison De Marchandises Dans Les Centre…

2017

International audience

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI][ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]ComputingMilieux_MISCELLANEOUS
researchProduct

Lightweight and Adaptive Anonymous Authentication Protocols in the Internet of Things Dedicated to E-Health Applications

2019

International audience

[SPI]Engineering Sciences [physics][SPI] Engineering Sciences [physics][INFO]Computer Science [cs][INFO] Computer Science [cs]ComputingMilieux_MISCELLANEOUS
researchProduct

Multi-Scale Feature Extraction for Vehicle Detection Using Phis-Lbp

2018

International audience; Multi-resolutionobjectdetectionfacesseveraldrawbacksincludingitshighdimensionalityproducedby a richer image representation in different channels or scales. In this paper, we propose a robust and lightweight multi-resolution method for vehicle detection using local binary patterns (LBP) as channel feature. Algorithm acceleration is done using LBP histograms instead of multi-scale feature maps and by extrapolating nearby scales to avoid computing each scale. We produce a feature descriptor capable of reaching a similar precision to other computationally more complex algorithms but reducing its size from 10 to 800 times. Finally, experiments show that our method can obt…

[SPI]Engineering Sciences [physics][SPI] Engineering Sciences [physics]Computer Science::Computer Vision and Pattern Recognitionfeatures pyramidsComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONFeature extractionvehicle detectiontextureLocal Binary Patterns
researchProduct

Characterisation and physico-chemical predictive modelling of Lithium-ion battery cells aging

2023

[SPI] Engineering Sciences [physics]
researchProduct