The paper introduces a GPRS-like cellular network simulator, where mobile terminals move, initiat... more The paper introduces a GPRS-like cellular network simulator, where mobile terminals move, initiate and terminate their communications. This tool aims at evaluating the major QoS parameters in realistic propagation conditions and for different resource allocation policies. Our ...
Abstract: In this paper, an adaptive QoS oriented CAC function is proposed to meet the rapidly in... more Abstract: In this paper, an adaptive QoS oriented CAC function is proposed to meet the rapidly increasing demand for providing multimedia services with diversified quality requirements. It decides whether the connection request is to be admitted into the system based on the ...
In today’s hyperconnected world, the Internet of Things and Cloud Computing complement each other... more In today’s hyperconnected world, the Internet of Things and Cloud Computing complement each other in several areas. Cloud Computing provides IoT systems with an efficient and flexible environment that supports application requirements such as real-time control/monitoring, scalability, fault tolerance, and numerous security services. Hardware and software limitations of IoT devices can be mitigated using the massive on-demand cloud resources. However, IoT cloud-based solutions pose some security and privacy concerns, specifically when an untrusted cloud is used. This calls for strong encryption schemes that allow operations on data in an encrypted format without compromising the encryption. This paper presents an asymmetric multi-key and partially homomorphic encryption scheme. The scheme provides the addition operation by encrypting each decimal digit of the given integer number separately using a special key. In addition, data integrity processes are performed when an untrusted thi...
In a peer-to-peer system, providing a service consumes peers resources and leads to the apparitio... more In a peer-to-peer system, providing a service consumes peers resources and leads to the apparition of selfish peers keeping their resources for their own use. Selfish peers decrease or suspend their service offer while requesting services from others. This behavior overwhelms peers offering services and degrades the system performance. Incentive mechanisms reduce or eliminate selfishness and encourage collaboration. In this paper, we propose a peers’ classification based on their selfishness or contribution level according to which peers are sanctioned or rewarded. With this objective, we introduce a new parameter called the activity level of a peer. Moreover, we describe the architecture of an incentive mechanism that uses the previous classification for a monitoring component called the Activity Level Controller. We show how to couple the different components for an incentive mechanism and give the pseudo-code of each building block of the incentive mechanism. Simulations results show that the success rate of the active peers is much higher than that of the inactive peers and blacklisted peers. Also, the messages overhead is lower than in a system without incentive mechanism.
Abstract High-Speed Downlink Packet Access (HSDPA) is an emerging wireless cellular-based system ... more Abstract High-Speed Downlink Packet Access (HSDPA) is an emerging wireless cellular-based system that promises a peak data rate of up to 14 Mbps. HSDPA relies on new technologies that make it possible to achieve such high data rate. These new ...
Abstract: In reconfiguration process, dynamic service deployment needs to find at anytime the bes... more Abstract: In reconfiguration process, dynamic service deployment needs to find at anytime the best way to lead data from source to destination. In this paper, we propose an optimization approach for routing in mobile radio networks. Three main algorithms are proposed. At first, a ...
In this paper, we address the quality aware routing issue in MANET: Mobile Ad hoc networks. The M... more In this paper, we address the quality aware routing issue in MANET: Mobile Ad hoc networks. The MANET network is based on dynamic radio links. Our contribution improves the multipath routing in Mobile Ad hoc networks based on the path quality, path stability and QoS awareness. Prediction methods are used in order to estimate the path quality. The paths will be sorted and weighted according to the application class. Route selection process is based on multi-criteria selection method. Interactions between routing layer and MAC layer are exploited to get the path quality. To take into account the application class in the routing process, cross layer interactions between routing layer and upper layers are needed. Application' classes will be defined according to the user's requirement thresholds defined by the ITU G-1010 recommendation [1]. A simulation study under NS2 will be conducted in this paper in order to validate our contribution.
Information dissemination in vehicular networks is becoming a hot topic of research in the field ... more Information dissemination in vehicular networks is becoming a hot topic of research in the field of Vehicle-to-Vehicle (V2V) communications, since efficient data exchange is needed for most crucial applications (road accident warning, traffic congestion warning ...). Many protocols have been then proposed for the sake of disseminating information with high reachability and low end-to-end delay in limited bandwidth. In this work, we propose to review the design of some of dissemination protocols based on the network coding technique. Newly adopted in wireless ad hoc networks, network coding paradigm seems to be a promising solution for data dissemination in vehicular environment. The goal of this work is then to classify the different network coding based protocols appeared in the literature and reveal the gain achieved once this technique is applied. To this end, a summary table for a comparative study of the numerous retained protocols is presented.
A large volume of sensor networks and trajectories of mobile objects are collected. Such data off... more A large volume of sensor networks and trajectories of mobile objects are collected. Such data offer us high value knowledge to understand moving objects and locations, fostering a broad range of applications in smart cities, enabling intelligent transportation systems and intelligent urban computing. The next generation of roads needs to be intelligent to accommodate a future transition to fully autonomous vehicles. Consequently, we need to engineer scalable and smart Trajectory Data Analytics Systems in order to analyze both historical data and real-time data flows, derive insights and convert insights into decisions and actions.The purpose of this paper is first to identify key functional and non-functional requirements that a Trajectory Data Analytical system must provide and second to survey open-source technologies designed for the analysis of general geo-referenced data.
The paper introduces a GPRS-like cellular network simulator, where mobile terminals move, initiat... more The paper introduces a GPRS-like cellular network simulator, where mobile terminals move, initiate and terminate their communications. This tool aims at evaluating the major QoS parameters in realistic propagation conditions and for different resource allocation policies. Our ...
Abstract: In this paper, an adaptive QoS oriented CAC function is proposed to meet the rapidly in... more Abstract: In this paper, an adaptive QoS oriented CAC function is proposed to meet the rapidly increasing demand for providing multimedia services with diversified quality requirements. It decides whether the connection request is to be admitted into the system based on the ...
In today’s hyperconnected world, the Internet of Things and Cloud Computing complement each other... more In today’s hyperconnected world, the Internet of Things and Cloud Computing complement each other in several areas. Cloud Computing provides IoT systems with an efficient and flexible environment that supports application requirements such as real-time control/monitoring, scalability, fault tolerance, and numerous security services. Hardware and software limitations of IoT devices can be mitigated using the massive on-demand cloud resources. However, IoT cloud-based solutions pose some security and privacy concerns, specifically when an untrusted cloud is used. This calls for strong encryption schemes that allow operations on data in an encrypted format without compromising the encryption. This paper presents an asymmetric multi-key and partially homomorphic encryption scheme. The scheme provides the addition operation by encrypting each decimal digit of the given integer number separately using a special key. In addition, data integrity processes are performed when an untrusted thi...
In a peer-to-peer system, providing a service consumes peers resources and leads to the apparitio... more In a peer-to-peer system, providing a service consumes peers resources and leads to the apparition of selfish peers keeping their resources for their own use. Selfish peers decrease or suspend their service offer while requesting services from others. This behavior overwhelms peers offering services and degrades the system performance. Incentive mechanisms reduce or eliminate selfishness and encourage collaboration. In this paper, we propose a peers’ classification based on their selfishness or contribution level according to which peers are sanctioned or rewarded. With this objective, we introduce a new parameter called the activity level of a peer. Moreover, we describe the architecture of an incentive mechanism that uses the previous classification for a monitoring component called the Activity Level Controller. We show how to couple the different components for an incentive mechanism and give the pseudo-code of each building block of the incentive mechanism. Simulations results show that the success rate of the active peers is much higher than that of the inactive peers and blacklisted peers. Also, the messages overhead is lower than in a system without incentive mechanism.
Abstract High-Speed Downlink Packet Access (HSDPA) is an emerging wireless cellular-based system ... more Abstract High-Speed Downlink Packet Access (HSDPA) is an emerging wireless cellular-based system that promises a peak data rate of up to 14 Mbps. HSDPA relies on new technologies that make it possible to achieve such high data rate. These new ...
Abstract: In reconfiguration process, dynamic service deployment needs to find at anytime the bes... more Abstract: In reconfiguration process, dynamic service deployment needs to find at anytime the best way to lead data from source to destination. In this paper, we propose an optimization approach for routing in mobile radio networks. Three main algorithms are proposed. At first, a ...
In this paper, we address the quality aware routing issue in MANET: Mobile Ad hoc networks. The M... more In this paper, we address the quality aware routing issue in MANET: Mobile Ad hoc networks. The MANET network is based on dynamic radio links. Our contribution improves the multipath routing in Mobile Ad hoc networks based on the path quality, path stability and QoS awareness. Prediction methods are used in order to estimate the path quality. The paths will be sorted and weighted according to the application class. Route selection process is based on multi-criteria selection method. Interactions between routing layer and MAC layer are exploited to get the path quality. To take into account the application class in the routing process, cross layer interactions between routing layer and upper layers are needed. Application' classes will be defined according to the user's requirement thresholds defined by the ITU G-1010 recommendation [1]. A simulation study under NS2 will be conducted in this paper in order to validate our contribution.
Information dissemination in vehicular networks is becoming a hot topic of research in the field ... more Information dissemination in vehicular networks is becoming a hot topic of research in the field of Vehicle-to-Vehicle (V2V) communications, since efficient data exchange is needed for most crucial applications (road accident warning, traffic congestion warning ...). Many protocols have been then proposed for the sake of disseminating information with high reachability and low end-to-end delay in limited bandwidth. In this work, we propose to review the design of some of dissemination protocols based on the network coding technique. Newly adopted in wireless ad hoc networks, network coding paradigm seems to be a promising solution for data dissemination in vehicular environment. The goal of this work is then to classify the different network coding based protocols appeared in the literature and reveal the gain achieved once this technique is applied. To this end, a summary table for a comparative study of the numerous retained protocols is presented.
A large volume of sensor networks and trajectories of mobile objects are collected. Such data off... more A large volume of sensor networks and trajectories of mobile objects are collected. Such data offer us high value knowledge to understand moving objects and locations, fostering a broad range of applications in smart cities, enabling intelligent transportation systems and intelligent urban computing. The next generation of roads needs to be intelligent to accommodate a future transition to fully autonomous vehicles. Consequently, we need to engineer scalable and smart Trajectory Data Analytics Systems in order to analyze both historical data and real-time data flows, derive insights and convert insights into decisions and actions.The purpose of this paper is first to identify key functional and non-functional requirements that a Trajectory Data Analytical system must provide and second to survey open-source technologies designed for the analysis of general geo-referenced data.
Uploads
Papers by Tarek BEJAOUI