Papers by Driss Ouadghiri
Lecture Notes in Computer Science, 2016
In the recent years, Vehicular Ad hoc NETworks VANETs have known a significant interest in terms ... more In the recent years, Vehicular Ad hoc NETworks VANETs have known a significant interest in terms of security and dependability. Moreover, we cannot ignore that this kind of networks request further work to provide different privacy related issues. Meaning that, the private data of users of this kind of network have to be prevented from different threats that may abuse their privacy. In this paper we propose an overall sight on the privacy threats in vehicular networks and we give our approach that addressing this issues. The goal here is providing the VANET dependability, by preventing the system assets from the potential threats that targets a vehicular system in order to more understand all ways in which the system can be attacked, that could help us to conceive countermeasures to counteract different possible attacks. Which could be done by applying the attack tree model on the vehicular system use case, in order to retrieve from it different informations in order to evaluate the system. Countermeasures could be added to the attack trees, that leads to the attack-defense tree model.
Bookmarks Related papers MentionsView impact
SSRN Electronic Journal, 2022
Bookmarks Related papers MentionsView impact
Internet of Things (IoT) and Big data technologies combined with context-driven control could pla... more Internet of Things (IoT) and Big data technologies combined with context-driven control could play an important role in developing approaches for reducing energy consumption while maintaining occupants' comfort in smart buildings. For instance, Heating, Ventilation and Air Conditioning systems (HVAC) are the most used systems for maintaining the thermal comfort inside buildings, however, they are considered among the main electricity consuming systems. Therefore, adopting new approaches for minimizing energy consumption seems to be the relevant solution. Renewable energy sources, such as geothermal energy is a promising technique that could be integrated together with the HVAC systems in order to save energy. In this paper, we propose a new approach towards an integrated system using Earth to Air Heat exchanger together with active HVAC systems operated and controlled by IoT and Big Data technologies. An experimental setup is discussed to highlight its components and usefulness ...
Bookmarks Related papers MentionsView impact
International Journal of Cloud Applications and Computing, 2017
The integration of cloud computing with mobile computing and internet has given birth to mobile c... more The integration of cloud computing with mobile computing and internet has given birth to mobile cloud computing. This technology offers many advantages to users, like Storage capacity, Reliability, Scalability and Real time data availability. Therefore, it is s increasing fast and it is inevitably integrated into everyday life. In MCC, data processing and data storage can be migrated into the cloud servers. However, the confidentiality of images and data is most important in today's environment. In this paper, we mainly focus on secure outsourcing of images. For this purpose, we propose a secure architecture composed by two clouds a private cloud dedicated for encryption/decryption and a second public cloud dedicated for storage. We have implemented the first cloud using openstack while respecting the encryption as a service concept. As an encryption scheme, we have used paillier's homomorphic cryptosystem designed specifically for images. The test of the homomorphic propert...
Bookmarks Related papers MentionsView impact
Lecture Notes in Electrical Engineering, 2021
Intrusions into the networks of the connected objects are rapidly evolving and affect its entire ... more Intrusions into the networks of the connected objects are rapidly evolving and affect its entire architecture (physical, network, application layers), as devices, networks and applications are increasingly connected and integrated. Securing these systems, which are generally constrained in resources, is becoming a necessity. Intrusion Detection Systems have proven to be an important security tool to detect attacks on the IoT network and resources. To create the IDS, Security researchers have recently used machine learning techniques because of the excellent results given by these methods (image and voice recognition, product recommendation, detection of spam and financial fraud …). Deep learning methods known for his or her successful ability to extract high-level functionality from big data are often a resilient mechanism for detecting small variants of attacks. The target of this work is to provide a general study on IDSs implementation techniques for IoT, precisely the classical methods and also the machine learning techniques. Finally, we give some recommendations of selected works that have practiced each of the methods presented.
Bookmarks Related papers MentionsView impact
International Journal of Computing
Wirelesse Nanosensor Networks (WNSNs) contain a large number of independent and mobile nanodevice... more Wirelesse Nanosensor Networks (WNSNs) contain a large number of independent and mobile nanodevices assembled with nanotransceivers and nanoantennas to work in Terahertz frequency band (0.1-10THz). These nanodevices exploit the properties of modern nanomaterials to recognize new varieties of events at the nanoscale, such as the presence of harmful viruses or bacteria and the detection of low concentrations of chemical and harmful gas molecules. Communication between nanonodes can be established by using molecular or electromagnetic communication approaches. One of the major problems of wireless nanosensor networks is the limited resources of nanodevices (e.g., computation, memory and power). On the other hand, such limited capacity cannot simply ensure communication between nanonodes using the flooding mechanism, which affects network performance and increases resource utilization. This paper considers the electromagnetic-based wireless nanosensor networks, and proposes a New Adaptiv...
Bookmarks Related papers MentionsView impact
2014 International Conference on Next Generation Networks and Services (NGNS), 2014
This paper introduces a system for chaotic traffic control; the proposed system is a simple, soph... more This paper introduces a system for chaotic traffic control; the proposed system is a simple, sophisticated and robust version of the Intelligent Traffic Light Flow Control System Using Wireless Sensors Networks proposed by Khalil M. et al. The proposed system adopts a simple approach by adding more Traffic Sensing Nodes [TSN] and distributing them in a matrix layout covering the road bed. In addition to controlling the traffic signaling lights, this system also feeds an online map web portal that shows a regularly updated status of the traffic within the concerned intersections. The Traffic Sensing Nodes operate according to the M/M/1/L queue while sensing the traffic.
Bookmarks Related papers MentionsView impact
2016 5th International Conference on Multimedia Computing and Systems (ICMCS), 2016
With rapid advances in nanotechnologies, Wireless Nanosensor Networks (WNSNs) have been emerged a... more With rapid advances in nanotechnologies, Wireless Nanosensor Networks (WNSNs) have been emerged as a typical subclass of WSNs but at nano-scale. WNSN is a new communication fabric that allows nanonodes to connect to each other using new mechanisms such as molecular (or chemical) and electromagnetic. Unlike traditional WSNs, nanonodes are tiny with limited resources (e.g., computation, memory and energy) and therefore, are not able to communicate with the destination node using a single-hop scenario. The flooding mechanism, in which each node rebroadcasts the message once, was adopted for broadcasting in electromagnetic-based WNSNs. While the flooding mechanism is very simple, it is not efficient since most of the nanonodes are expected to rebroadcast a message at the same time, thus collisions are likely to occur. Furthermore, the excess number of rebroadcasts increases resources utilization that affects the network performance and increases energy consumption. In this paper, we inv...
Bookmarks Related papers MentionsView impact
Wireless nano sensors networks (WNSN) have emerged recently to allow nanonodes to communicate to ... more Wireless nano sensors networks (WNSN) have emerged recently to allow nanonodes to communicate to each other using nano-communication mechanisms. Nanodevices are characterized by limited resources, and new communication protocols are, therefore, required. For instance, the flooding mechanism has been proposed for broadcasting in electromagnetic-based WNSNs. While the flooding scheme is very simple, the excessive number of rebroadcasts increases the utilization of the resources that affects the performance and increases the energy consumption. In this paper, we adopt the probabilistic-based broadcasting mechanism in the context of WNSNs. Simulations have been conducted using Nanosim and results show that probabilistic-based flooding mechanism reduces redundant retransmissions while maintaining good performance.
Bookmarks Related papers MentionsView impact
Computer Communications, 2014
This article presents a comprehensive survey of routing protocols proposed for routing in Vehicul... more This article presents a comprehensive survey of routing protocols proposed for routing in Vehicular Delay Tolerant Networks (VDTN) in vehicular environment. DTNs are utilized in various operational environments, including those subject to disruption and disconnection and those with high-delay, such as Vehicular Ad-Hoc Networks (VANET). We focus on a special type of VANET, where the vehicular traffic is sparse and direct end-to-end paths between communicating parties do not always exist. Thus, communication in this context falls into the category of Vehicular Delay Tolerant Network (VDTN). Due to the limited transmission range of an RSU (Road Side Unit), remote vehicles, in VDTN, may not connect to the RSU directly and thus have to rely on intermediate vehicles to relay the packets. During the message relay process, complete end-to-end paths may not exist in highly partitioned VANETs. Therefore, the intermediate vehicles must buffer and forward messages opportunistically. Through buffer, carry and forward, the message can eventually be delivered to the destination even if an end-to-end connection never exists between source and destination. The main objective of routing protocols in DTN is to maximize the probability of delivery to the destination while minimizing the end-to-end delay. Also, vehicular traffic models are important for DTN routing in vehicle networks because the performance of DTN routing protocols is closely related to population and mobility models of the network.
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
International Journal of Advanced Computer Science and Applications, 2012
Bookmarks Related papers MentionsView impact
2009 International Conference on Multimedia Computing and Systems, 2009
... INPT, Av. Allal Al fassi, Rabat, Morocco 1Department of Computer Science Hassan II University... more ... INPT, Av. Allal Al fassi, Rabat, Morocco 1Department of Computer Science Hassan II University, FSTM Mohammedia, Morocco Emails:jamali@inpt.ac.ma.naja@inpt.ac. ma. Abstract ... different nodes. Much research has been done on 3 ...
Bookmarks Related papers MentionsView impact
2013 IFIP Wireless Days (WD), 2013
ABSTRACT In this paper we propose a management approach of routing based on one of the largest ex... more ABSTRACT In this paper we propose a management approach of routing based on one of the largest existing reactive routing protocols which is AODV, and able to minimize routing messages (overhead) in contexts with strong constraints. This approach takes into account a metric based on energy consumption during the route discovery, in order to increase the lifetime of the network, and also allows such applications to consider, when resources are lacking, the maintenance of QoS connections of users with the highest priority. The traditional mechanisms based on AODV aim to use parameters TTL ART,... for reduction of routing messages in the phase of route discovery and maintenance phase. However, it is conceivable that in certain application environments do not challenge these parameters for the overhead reduction, and to consider management rested on a policy of distribution of RREQ messages between mobile nodes, based on the energy level residual of each node, which allows more to extend the lifetime of the network for applications sensitive to energy use.
Bookmarks Related papers MentionsView impact
Intrusions into the networks of the connected objects are rapidly evolving and affect its entire ... more Intrusions into the networks of the connected objects are rapidly evolving and affect its entire architecture (physical, network, application layers), as devices, networks and applications are increasingly connected and integrated. Securing these systems, which are generally constrained in resources, is becoming a necessity. Intrusion Detection Systems have proven to be an important security tool to detect attacks on the IoT network and resources. To create the IDS, Security researchers have recently used machine learning techniques because of the excellent results given by these methods (image and voice recognition, product recommendation, detection of spam and financial fraud …). Deep learning methods known for his or her successful ability to extract high-level functionality from big data are often a resilient mechanism for detecting small variants of attacks. The target of this work is to provide a general study on IDSs implementation techniques for IoT, precisely the classical ...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
MPLS/VPN backbones are widely used today by various operators and private companies in the world,... more MPLS/VPN backbones are widely used today by various operators and private companies in the world, high to medium-sized, either use an operator or build their own MPLS/VPN backbone. Real time applications like voice and video are more and more integrated to end user applications, making them ever more time sensitive. Operators are offering services like hosting companies voice platforms, voip call centers, iptv ..etc. All these aspects make the convergence time inside a backbone a challenge for service providers. However, the global convergence time is an assembly of several factors including: link or node failure detection, IGP failure detection, LSP Generation, SPT Computation, RIB update, local FIB creation and distribution ...updates signaling...etc., a lot of approaches can be used to minimize the convergence time, our approach consist on enhancements and optimization in control and forwarding plane, the scope of our work is the core backbone, however a lot of things can also be...
Bookmarks Related papers MentionsView impact
Heating, Ventilation and Air Conditioning systems (HVAC) are the main electricity consuming syste... more Heating, Ventilation and Air Conditioning systems (HVAC) are the main electricity consuming systems in buildings. However, they are the most used systems for maintaining thermal comfort inside buildings. Therefore, approaches that increase occupants’ comfort while reducing energy consumption of these systems are highly required. Renewable energies represent a great alternative considering its significant impact in reducing electricity consumption, thus, minimizing harmful gas emissions. Increased emphasis has been recently put on geothermal energy for heating, ventilation and air conditioning. For instance, Earth to Air heat exchangers (EAHE) could be used for extracting heat from the ground for either cooling or heating. It could have a significant impact on energy saving and bills while maintaining occupants’ comfort. EAHE is basically a buried pipe at a certain depth in the ground where air exchanges heat with soil during its time pass. In the present work, a modeling and sizing ...
Bookmarks Related papers MentionsView impact
Computer Communications
Bookmarks Related papers MentionsView impact
Software-defined networking (SDN) is a new networking paradigm which aims to decouple forwarding ... more Software-defined networking (SDN) is a new networking paradigm which aims to decouple forwarding hardware from control decisions. Existing SDN architectures centralize control logic to networks, and, however, cannot meet the requirements of scalability and adaptability simultaneously. Issues are that SDN architectures must be able to scale and able to adapt to dynamic conditions. Therefore, in order to cope with large-scale and dynamically changing networks, new architectures are required and need to be highly flexible. In this paper, an architecture that organizes controllers in a distributed hierarchy is introduced. Design concepts are presented to highlight its operation modes. Simulations have been conducted using Mininet and preliminary results are reported to show that the proposed architecture could reduce setup time of flow initiation.
Bookmarks Related papers MentionsView impact
Uploads
Papers by Driss Ouadghiri