75 results on '"Amine Dhraief"'
Search Results
2. Unlocking the Power of Reinforcement Learning: Investigating Optimal Q-Learning Parameters for Routing in Flying Ad Hoc Networks.
- Author
-
Mariem Bousaid, Safa Kaabi, Amine Dhraief, and Khalil Drira
- Published
- 2023
- Full Text
- View/download PDF
3. On Safety of Decentralized Unmanned Aircraft System Traffic Management Using Blockchain.
- Author
-
Asma Hamissi, Amine Dhraief, and Layth Sliman
- Published
- 2023
- Full Text
- View/download PDF
4. How to Cache in ICN-Based IoT Environments?
- Author
-
Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil 0001, and Khalil Drira
- Published
- 2017
- Full Text
- View/download PDF
5. Producer Mobility support in Named Data Internet of Things Network.
- Author
-
Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil 0001, and Khalil Drira
- Published
- 2017
- Full Text
- View/download PDF
6. VALS: Vehicle-aided location service in urban environment.
- Author
-
Raik Aissaoui, Amine Dhraief, Abdelfettah Belghith, Hamid Menouar, Fethi Filali, and Hassan Mathkour
- Published
- 2016
- Full Text
- View/download PDF
7. A three dimensional scalable and distributed conflict detection algorithm for unmanned aerial vehicles.
- Author
-
Imen Mahjri, Amine Dhraief, and Abdelfettah Belghith
- Published
- 2016
- Full Text
- View/download PDF
8. City-Obstacles Impact on OLSR-Based Routing Protocols.
- Author
-
Mohamed Belhassen, Amine Dhraief, and Abdelfettah Belghith
- Published
- 2015
- Full Text
- View/download PDF
9. A Review on Collision Avoidance Systems for Unmanned Aerial Vehicles.
- Author
-
Imen Mahjri, Amine Dhraief, and Abdelfettah Belghith
- Published
- 2015
- Full Text
- View/download PDF
10. TCP Application Recovery Improvement After Handover in Mobile Networks.
- Author
-
Hajer Souri, Amine Dhraief, and Abdelfettah Belghith
- Published
- 2015
- Full Text
- View/download PDF
11. Cache coherence in Machine-to-Machine Information Centric Networks.
- Author
-
Maroua Meddeb, Amine Dhraief, Abdelfettah Belghith, Thierry Monteil 0001, and Khalil Drira
- Published
- 2015
- Full Text
- View/download PDF
12. Non-Terrestrial Networks in a Nutshell
- Author
-
Ikbal Chammakhi Msadaa, Sajeh Zairi, and Amine Dhraief
- Subjects
General Earth and Planetary Sciences ,General Environmental Science - Published
- 2022
13. An integrated framework for localization and coverage maintenance in wireless sensor networks.
- Author
-
Imen Mahjri, Amine Dhraief, Issam Mabrouki, Abdelfettah Belghith, and Khalil Drira
- Published
- 2014
- Full Text
- View/download PDF
14. Advanced real-time traffic monitoring system based on V2X communications.
- Author
-
Raik Aissaoui, Hamid Menouar, Amine Dhraief, Fethi Filali, Abdelfettah Belghith, and Adnan A. Abu-Dayya
- Published
- 2014
- Full Text
- View/download PDF
15. M2M Platform with Autonomic Device Management Service.
- Author
-
Maroua Meddeb, Mahdi Ben Alaya, Thierry Monteil 0001, Amine Dhraief, and Khalil Drira
- Published
- 2014
- Full Text
- View/download PDF
16. Smart Metering Privacy-preserving Techniques in a Nutshell.
- Author
-
Hajer Souri, Amine Dhraief, Syrine Tlili, Khalil Drira, and Abdelfettah Belghith
- Published
- 2014
- Full Text
- View/download PDF
17. The Coverage Configuration Protocol under AT-Dist Localization.
- Author
-
Imen Mahjri, Amine Dhraief, Issam Mabrouki, Abdelfettah Belghith, and Khalil Drira
- Published
- 2014
- Full Text
- View/download PDF
18. CrossWalk: A novel cross-layer random walk data dissemination in wireless sensor networks.
- Author
-
Issam Mabrouki, Nesrine Ben Khalifa, Amine Dhraief, and Abdelfettah Belghith
- Published
- 2013
- Full Text
- View/download PDF
19. Simultaneous mobility management in the HIP-based M2M overlay network.
- Author
-
Amine Dhraief, Mohamed Amine Ghorbali, Tarek Bouali, Abdelfettah Belghith, and Khalil Drira
- Published
- 2013
- Full Text
- View/download PDF
20. Collision aware coloring algorithm for wireless sensor networks.
- Author
-
Imen Jemili, Dhouha Ghrab, Abdelfettah Belghith, Bilel Derbel, and Amine Dhraief
- Published
- 2013
- Full Text
- View/download PDF
21. Mobility Management in the HIP-based M2M Overlay Network.
- Author
-
Amine Dhraief, Mohamed Amine Ghorbali, Tarek Bouali, and Abdelfettah Belghith
- Published
- 2013
- Full Text
- View/download PDF
22. Coloring based Hierarchical Routing Approach.
- Author
-
Dhouha Ghrab, Bilel Derbel, Imen Jemili, Amine Dhraief, Abdelfettah Belghith, and El-Ghazali Talbi
- Published
- 2013
- Full Text
- View/download PDF
23. Autonomic Management of the HIP-based M2M Overlay Network.
- Author
-
Amine Dhraief, Abdelfettah Belghith, Khalil Drira, Tarek Bouali, and Mohamed Amine Ghorbali
- Published
- 2013
- Full Text
- View/download PDF
24. Self-healing and Optimizing of the HIP-based M2M Overlay Network.
- Author
-
Amine Dhraief, Khalil Drira, Abdelfettah Belghith, Tarek Bouali, and Mohamed Amine Ghorbali
- Published
- 2013
25. Suitability analysis of mobility and multihoming unification.
- Author
-
Amine Dhraief and Abdelfettah Belghith
- Published
- 2010
- Full Text
- View/download PDF
26. The impact of mobile IPv6 on transport protocols an experimental investigation.
- Author
-
Amine Dhraief, Abdelfettah Belghith, and Zied Chedly
- Published
- 2010
- Full Text
- View/download PDF
27. Rehoming Decision Algorithm: Design and Empirical Evaluation.
- Author
-
Amine Dhraief and Nicolas Montavont
- Published
- 2009
- Full Text
- View/download PDF
28. Toward Mobility and Multihoming Unification- The SHIM6 Protocol: A Case Study.
- Author
-
Amine Dhraief and Nicolas Montavont
- Published
- 2008
- Full Text
- View/download PDF
29. NS2 based simulation framework to evaluate the performance of wireless distribution systems.
- Author
-
Amine Dhraief, Abdelfattah Belghith, Nicolas Montavont, Jean-Marie Bonnin, and Mohamed Kassab
- Published
- 2007
30. Collision risk assessment in Flying Ad Hoc aerial wireless networks
- Author
-
Amine Dhraief, Abdelfettah Belghith, Maram Alajlan, Issam Mabrouki, Imen Mahjri, and Sofien Gannouni
- Subjects
0209 industrial biotechnology ,Mobility model ,SIMPLE (military communications protocol) ,Computer Networks and Communications ,Wireless network ,Computer science ,Stochastic modelling ,Real-time computing ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,020206 networking & telecommunications ,02 engineering and technology ,Collision ,Computer Science Applications ,Computer Science::Robotics ,020901 industrial engineering & automation ,Computer Science::Systems and Control ,Hardware and Architecture ,Control theory ,0202 electrical engineering, electronic engineering, information engineering ,Collision detection - Abstract
A stochastic model is introduced that accurately models collisions in Flying Ad Hoc wireless Networks (FANETs) where Unmanned Aerial Vehicles (UAVs) are flying within the same shared 3D airspace. The model has two input parameters, the number of flying UAVs and the average time for an arbitrary UAV to come into contact with another UAV (the inter contact time). Using only these two parameters, we provide simple, yet accurate closed-form expressions for different collision related metrics such as safety periods, survival probabilities and number of collisions. Two scenarios are particularly considered. The first assumes that UAVs are equipped with perfect collision detection and avoidance capabilities. This is essentially to answer the question of whether detection and resolution tools are required for a given UAVs fleet to accomplish its mission. The second scenario assumes that small UAVs cannot satisfy the requirements of collision detection and avoidance equipage due to their size, weight or power constraints. While the number of deployed UAVs is easily known, the setup of the inter contact time is rather problematic for the end user (space controller) of the system. To this end, we developed a generic simple expression of the inter contact time to ease the administration task. This generic expression is then instantiated to two mobility models. Extensive simulations based on OMNeT++ are used to validate the obtained analytical results. The simulation results are shown to be in a remarkable agreement with those of the conducted mathematical analysis.
- Published
- 2018
31. AFIRM: Adaptive forwarding based link recovery for mobility support in NDN/IoT networks
- Author
-
Abdelfettah Belghith, Amine Dhraief, Thierry Monteil, Sofien Gannouni, Maroua Meddeb, Khalil Drira, Équipe Services et Architectures pour Réseaux Avancés (LAAS-SARA), Laboratoire d'analyse et d'architecture des systèmes (LAAS), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT), Heterogeneous Advanced Networking and Applications [Manouba] (HANAlab), Université de la Manouba [Tunisie] (UMA)-École Nationale des Sciences de l'Informatique [Manouba] (ENSI), Université de la Manouba [Tunisie] (UMA), Centre de Recherche Réseau Image SysTème Architecture et MuLtimédia (CRISTAL), École Nationale des Sciences de l'Informatique [Manouba] (ENSI), Université de la Manouba [Tunisie] (UMA)-Université de la Manouba [Tunisie] (UMA), King Saud University [Riyadh] (KSU), Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), and Université Fédérale Toulouse Midi-Pyrénées
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,[INFO.INFO-WB]Computer Science [cs]/Web ,020206 networking & telecommunications ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,02 engineering and technology ,Network dynamics ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET] ,020201 artificial intelligence & image processing ,business ,Internet of Things ,Software ,Computer network - Abstract
International audience; The Internet of Things (IoT) ecosystem includes a plethora of devices equipped with heterogeneous communication interfaces. They exhibit different mobility patterns and hardware constraints as memory, battery and processing power. On the other hand, IoT applications are overlayed on top of these constrained-devices imposing stringent requirements in term of data availability, data coherence, and response latency. To cope with these challenges, Named Data Networking (NDN) architecture is positioned in the middle layer to act as the networking layer. By providing easy data access thanks to the unique and location-independent content names, in-network caching and name-based routing, NDN expects to hide from IoT applications the complexity and diversity of the underlying Things by adapting the network operation to their features. In this paper, we focus on data availability requirements threatened by high IoT network dynamics related to sensors mobility. We address the producer mobility issue in NDN/IoT networks using the routing-based approach. We propose a novel and efficient forwarding algorithm named AFIRM in order to support producer mobility, and compare its performances to those of other relevant solutions based on the routing approach.
- Published
- 2018
32. SLIDE: A Straight Line Conflict Detection and Alerting Algorithm for Multiple Unmanned Aerial Vehicles
- Author
-
Imen Mahjri, Ahmad Almogren, Abdelfettah Belghith, and Amine Dhraief
- Subjects
0209 industrial biotechnology ,Computer Networks and Communications ,Computer science ,Mobile computing ,020206 networking & telecommunications ,02 engineering and technology ,Set (abstract data type) ,020901 industrial engineering & automation ,0202 electrical engineering, electronic engineering, information engineering ,Trajectory ,Collision detection ,Electrical and Electronic Engineering ,Airspace class ,Algorithm ,Software - Abstract
Conflict detection is an important research issue in Unmanned Aerial Vehicles to ensure safety and collision free flights. In this paper, we first propose a comprehensive analytical framework for a three dimensional conflict detection. Then, we propose SLIDE a new Straight LIne conflict DEtection and alerting algorithm for a set of UAVs to safely share a common airspace. SLIDE is fully distributed and requires a limited state information exchange between UAVs. The assumptions of precise state information and packet-loss free communications are relaxed so as to guarantee the applicability and efficiency of the algorithm in real world situations. A thorough discussion is also presented to deal with appropriate tuning of the different parameters of the collision detection framework. Extensive simulations based on OMNeT++ are used to validate SLIDE and evaluate its performance. Simulation results indicate that SLIDE guarantees a reduced number of false and missed alarms even in high density traffic scenarios and communication perturbed environments, yet it leaves adequate time to accomplish the required maneuver actions.
- Published
- 2018
33. Named Data Networking
- Author
-
Thierry Monteil, Amine Dhraief, Abdelfettah Belghith, Maroua Meddeb, Khalil Drira, and Saad Al-Ahmadi
- Subjects
Multicast ,Computer Networks and Communications ,Computer science ,business.industry ,020206 networking & telecommunications ,Context (language use) ,02 engineering and technology ,Computer security ,computer.software_genre ,law.invention ,Near field communication ,Information-centric networking ,law ,Anycast ,Internet Protocol ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,The Internet ,Architecture ,business ,computer ,Information Systems ,Computer network - Abstract
The Internet of things (IoT) is commonly perceived as the mere extension of the current Internet to our physical world to interconnect an unprecedented number of sensors/actuators, referred to as things. In this Internet architectural context, some IoT services are currently offered by several Telecom operators of the Arab World such as tracking services, near field communication, and surveillance, e-health and security services. However, the current Internet TCP/IP protocol suite has reached its limits and is deemed inappropriate to deal with the stringent challenges imposed by the heterogeneity as well as the number of these constrained devices. On the other hand, the Named Data Networking (NDN) has recently received a lot of attention as a potential Information-Centric Networking (ICN) architecture for the future Internet. The NDN paradigm, relying on location-independent naming, in-network caching, name-based routing, multicast, anycast, mobility and self-secured content, has a great potential to efficiently address and solve the current seminal IP-based IoT architecture issues and requirements. In this paper, we first overview the current research and development progress in ICN, then we conduct a comparative study of the relevant ICN proposals and platforms, and finally, we discuss the suitability of the NDN as a promising lever architecture for IoT.
- Published
- 2018
34. ALOE: autonomic locating of obstructing entities in MANETs
- Author
-
Abdelfettah Belghith, Amine Dhraief, Mohamed Belhassen, and Hassan Mathkour
- Subjects
Routing protocol ,General Computer Science ,Network packet ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,020302 automobile design & engineering ,Throughput ,02 engineering and technology ,Mobile ad hoc network ,0203 mechanical engineering ,Link-state routing protocol ,0202 electrical engineering, electronic engineering, information engineering ,Routing (electronic design automation) ,business ,Protocol (object-oriented programming) ,Computer network - Abstract
The presence of communication obstructing entities severely degrades the routing efficiency in Mobile Ad hoc Networks (MANET). While several routing protocols have proposed ways to mitigate this degradation essentially by getting around and avoiding obstacles, the detection of obstacle locations and their contours driven by the very signaling of the underlying routing protocol has not been given that much attention. Yet, the integration of such a capability within the routing protocol presents an adequate leverage of the routing efficiency. In this paper, we first propose a distributed autonomic scheme to locate obstructing entities (coined ALOE) within a MANET using the basic signaling of the Cartography Enhanced Optimized Link State routing (CE-OLSR) protocol. Then, we propose ALOE-CE-OLSR the integration of ALOE within CE-OLSR, and show the resulting improvement in routing validity as compared to that of both CE-OLSR with and without a priori knowledge of the obstructing entities map. While the routing validity measures the pertinence of the routes computed by the underlying routing protocol, two new metrics, namely the coverage and the precision ratios, are defined to properly evaluate the efficiency and performance of our proposed detection scheme, in addition to the throughput as well as the end-to-end delay of received data packets. Simulation results show that our proposed CE-OLSR signaling-based obstacle detection scheme accurately localizes and detects the boundaries of the stationary obstructing obstacles. The integrated ALOE-CE-OLSR achieves the same route validity, throughput and delay as CE-OLSR with a priori precise knowledge of the obstacles map.
- Published
- 2018
35. Cache Freshness in Named Data Networking for the Internet of Things
- Author
-
Amine Dhraief, Maroua Meddeb, Saad Al-Ahmadi, Abdelfettah Belghith, Thierry Monteil, Khalil Drira, Équipe Services et Architectures pour Réseaux Avancés (LAAS-SARA), Laboratoire d'analyse et d'architecture des systèmes (LAAS), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT), Heterogeneous Advanced Networking and Applications [Manouba] (HANAlab), Université de la Manouba [Tunisie] (UMA)-École Nationale des Sciences de l'Informatique [Manouba] (ENSI), Université de la Manouba [Tunisie] (UMA), King Saud University [Riyadh] (KSU), Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), and Université Fédérale Toulouse Midi-Pyrénées
- Subjects
IoT ,General Computer Science ,business.industry ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,Content based networking ,NDN ,In-network caching ,ICN ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Data access ,Freshness ,Models of communication ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Process costing ,Cache ,Latency (engineering) ,Architecture ,business ,Internet of Things ,Cache cost ,Computer network - Abstract
International audience; The Information-Centric Networking (ICN) paradigm is shaping the foreseen future Internet architecture by focusing on the data itself rather than its hosting location. It is a shift from a host-centric communication model to a content-centric model supporting among others unique and location-independent content names, in-network caching and name-based routing. By leveraging the easy data access, and reducing both the retrieval delay and the load on the data producer, the ICN can be a viable framework to support the Internet of Things (IoT), interconnecting billions of heterogeneous constrained objects. Among several ICN architectures, the Named Data Networking (NDN) is considered as a suitable ICN architecture for IoT systems. However, its default caching approach lacks a data freshness mechanism, while IoT data are transient and frequently updated by the producer which imposes stringent requirements in terms of information freshness. Furthermore, IoT devices are usually resource-constrained with harsh limitations on energy, memory and processing power. We propose in this paper a caching strategy and a novel cache freshness mechanism to monitor the validity of cached contents in an IoT environment while minimizing the caching process cost. We compared our solution to several relevant schemes using the ccnSim simulator. Our solution exhibits the best system performances in terms of hop reduction ratio, server hit reduction ratio and response latency, yet it provides the lowest cache cost and significantly improves the content validity.
- Published
- 2018
36. Producer Mobility support in Named Data Internet of Things Network
- Author
-
Amine Dhraief, Abdelfettah Belghith, Thierry Monteil, Khalil Drira, and Maroua Meddeb
- Subjects
business.industry ,Computer science ,020206 networking & telecommunications ,Context (language use) ,02 engineering and technology ,Computer security ,computer.software_genre ,0202 electrical engineering, electronic engineering, information engineering ,General Earth and Planetary Sciences ,020201 artificial intelligence & image processing ,Internet of Things ,business ,Dissemination ,computer ,General Environmental Science ,Data transmission - Abstract
Named-Data Networking (NDN) is a promising candidate for the Internet of Things (IoT) which targets to improve data dissemination efficiency. This new paradigm brings considerable benefits such as minimizing the content producer solicitation and rapid data transmission. However, the producer mobility issue in NDN is not sufficiently addressed. Especially, in IoT scenario, in which devices are frequently mobile and it requires data to keep continuity. In this paper, we present proposed producer mobility solutions in NDN in an IoT context.
- Published
- 2017
37. Least fresh first cache replacement policy for NDN-based IoT networks
- Author
-
Maroua Meddeb, Khalil Drira, Hassan Mathkour, Thierry Monteil, Amine Dhraief, Abdelfettah Belghith, Équipe Services et Architectures pour Réseaux Avancés (LAAS-SARA), Laboratoire d'analyse et d'architecture des systèmes (LAAS), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT), Heterogeneous Advanced Networking and Applications [Manouba] (HANAlab), Université de la Manouba [Tunisie] (UMA)-École Nationale des Sciences de l'Informatique [Manouba] (ENSI), Université de la Manouba [Tunisie] (UMA), Department of Computer Engineering, King Faisal University, Al-Ahsa, Kingdom of Saudi Arabia, King Faisal University (KFU), College of Computer and Information Sciences [Riyadh], King Saud University [Riyadh] (KSU), Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), and Université Fédérale Toulouse Midi-Pyrénées
- Subjects
Hardware_MEMORYSTRUCTURES ,Computer Networks and Communications ,Computer science ,business.industry ,[INFO.INFO-WB]Computer Science [cs]/Web ,020206 networking & telecommunications ,02 engineering and technology ,Content based networking ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,Reduction ratio ,Computer Science Applications ,Hop (networking) ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET] ,Cache ,Latency (engineering) ,business ,Internet of Things ,Dissemination ,Software ,Information Systems ,Computer network - Abstract
International audience; In-network caching in Named Data Networking (NDN) based Internet of Things (IoT) plays a central role for efficient data dissemination. Data cached throughout the network may quickly become obsolete as they are transient and frequently updated by their producers. As such, NDN-based IoT networks impose stringent requirement in terms of data freshness. While various cache replacement policies were proposed, none has considered the cache freshness requirement. In this paper, we introduce a novel cache replacement policy called Least Fresh First (LFF) integrating the cache freshness requirement. LFF evicts invalid cached contents based on time series forecasting of sensors future events. Extensive simulations are performed to evaluate the performance of LFF and to compare it to the different well-known cache replacement policies in ICN-based IoT networks. The obtained results show that LFF significantly improves data freshness compared to other policies, while enhancing the server hit reduction ratio, the hop reduction ratio and the response latency.
- Published
- 2019
38. How to Cache in ICN-Based IoT Environments?
- Author
-
Abdelfettah Belghith, Khalil Drira, Maroua Meddeb, Thierry Monteil, Amine Dhraief, Équipe Services et Architectures pour Réseaux Avancés (LAAS-SARA), Laboratoire d'analyse et d'architecture des systèmes (LAAS), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT), Heterogeneous Advanced Networking and Applications [Manouba] (HANAlab), Université de la Manouba [Tunisie] (UMA)-École Nationale des Sciences de l'Informatique [Manouba] (ENSI), Université de la Manouba [Tunisie] (UMA), College of Computer and Information Sciences [Riyadh], King Saud University [Riyadh] (KSU), Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), and Université Fédérale Toulouse Midi-Pyrénées
- Subjects
Hardware_MEMORYSTRUCTURES ,Multicast ,business.industry ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Smart Cache ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,The Internet ,Cache ,Latency (engineering) ,business ,Internet of Things ,Dissemination ,Computer network - Abstract
International audience; Information-Centric Networking (ICN) is an emerging network paradigm based on name-identified data objects and in-network caching. Therefore, ICN contents are distributed in a scalable and cost-efficient manner. With the rapid growth of IoT traffic, ICN is intended to be a suitable architecture to support IoT networks. In fact, ICN provides unique persistent naming, in-network caching and multicast communications which reduce the data producer load and the response latency. Using ICN in an IoT environment requires a study of caching policies in terms of cache placement strategies and cache replacement policies. To this end, we address, in this paper, caching challenges with the aim to identify which caching policies are suitable for IoT networks. Simulation findings show that the combination of the consumer-cache caching strategy and the RR cache replacement policy is the most convenient in IoT environments in terms of hop reduction ratio, server hit reduction and response latency.
- Published
- 2017
39. M2M Platform with Autonomic Device Management Service
- Author
-
Mahdi Ben Alaya, Thierry Monteil, Maroua Meddeb, Amine Dhraief, Khalil Drira, Heterogeneous Advanced Networking and Applications [Manouba] (HANAlab), Université de la Manouba [Tunisie] (UMA)-École Nationale des Sciences de l'Informatique [Manouba] (ENSI), Université de la Manouba [Tunisie] (UMA), Équipe Services et Architectures pour Réseaux Avancés (LAAS-SARA), Laboratoire d'analyse et d'architecture des systèmes (LAAS), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT), Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), and Université Fédérale Toulouse Midi-Pyrénées
- Subjects
Service (systems architecture) ,autonomic computing ,business.industry ,Computer science ,computer.internet_protocol ,Complex system ,Service-oriented architecture ,OMA DM ,Autonomic computing ,Devices Management ,General Earth and Planetary Sciences ,[INFO]Computer Science [cs] ,M2M ,Architecture ,ETSI ,Telecommunications ,business ,Internet of Things ,computer ,Protocol (object-oriented programming) ,General Environmental Science ,Computer network - Abstract
International audience; The Internet of Things (IoT) is a way to address and communicate with objects and their virtual representations. The exponential development of Smartphone, tablet, sensors and their applications has created very complex systems. From here, the concept of M2M (Machine-to-Machine) has emerged to provide communication and service architecture without human intervention. The European Telecommunications Standards Institute (ETSI) has proposed a horizontal architecture that can fit to several domains: transport, energy, e-health, etc. A crucial aspect is the management of devices in a system where equipment can be used during decades. Several protocols exist, in this article we explain the OMA DM management protocol, and we describe its connection to the ETSI-M2M platform. An extension of device management is proposed with an autonomic capability.
- Published
- 2014
- Full Text
- View/download PDF
40. Smart Metering Privacy-preserving Techniques in a Nutshell
- Author
-
Amine Dhraief, Hajer Souri, Syrine Tlili, Abdelfettah Belghith, and Khalil Drira
- Subjects
Computer science ,Energy management ,security ,privacy ,Computer security ,computer.software_genre ,Grid ,AMI ,Privacy preserving ,Aggregation ,Smart grid ,Order (exchange) ,General Earth and Planetary Sciences ,Metering mode ,Smart Grid ,computer ,General Environmental Science - Abstract
The legacy power grid has several limitations resulting in misuse and mismanagement of energy. The evolution of IT technologies have empowered revolutionizing the power grid and created the concept of the Smart Grid. Hence, the Smart Grid is considered as the integration of the latest information, communication and operational technologies with the traditional power grid in order to enhance energy management within a reliable, efficient network linking the diffirent grid actors from the consumer to the end-head system such as energy providers and billing services. Introducing new technologies into Smart Grid raises new issues, mainly security issues. Therefore, in this paper, after presenting the Smart Grid and the smart metering system, we present the security requirements of the Smart Grid and we highlight the user privacy concern as well as the different techniques proposed in literature to deal with it. Our main objective is to provide a study of the existing techniques preventing privacy disclosure.
- Published
- 2014
41. Autonomic Management of the HIP-based M2M Overlay Network
- Author
-
Tarek Bouali, Abdelfettah Belghith, Amine Dhraief, Mohmaed Amine Ghorbali, and Khalil Drira
- Subjects
Machine-to-Machine ,Overlay networks ,Computer science ,business.industry ,Autonomic management ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Overlay network ,Gateway (computer program) ,OMNeT++ ,Network simulation ,REAP ,Default gateway ,General Earth and Planetary Sciences ,The Internet ,business ,Protocol (object-oriented programming) ,General Environmental Science ,PATH (variable) ,Computer network - Abstract
In a previous work, we build an M2 M overlay network over the Internet in order to ensure private communication between M2 M devices, M2 M gateway and M2 M applications. We propose in this paper to add the autonomic man- agement of this overlay network. We add the self-healing and self-optimization capabilities to the M2 M gateway. The M2 M gateway is able to detect failures in the overlay path and recover from them. It is also able to dynamically monitor the overlay path and select the best available path in term of RTT. These two features are provided by the reachabil- ity protocol (REAP) at the gateway level. We implement our solution on the OMNeT++ network simulator. Results highlight the novel gateway capabilities: it recovers from failures and always select the best available path.
- Published
- 2013
42. VALS: Vehicle-aided location service in urban environment
- Author
-
Hamid Menouar, Raik Aissaou, Abdelfettah Belghith, Hassen Mathkour, Amine Dhraief, and Fethi Filali
- Subjects
Service (business) ,VALS ,business.industry ,Computer science ,Vehicular Communication ,05 social sciences ,050801 communication & media studies ,020206 networking & telecommunications ,Economic shortage ,02 engineering and technology ,infrastructure ,0508 media and communications ,Location service ,Server ,Location-based service ,0202 electrical engineering, electronic engineering, information engineering ,Mobile telephony ,business ,Urban environment ,Computer network - Abstract
In Vehicular Ad-hoc Networks (VANETs), any vehicle uses a location service to get an up-To-date data of all vehicles' positions in its vicinity. Many location services rely on infrastructures to perform location update and location query tasks. However, the infrastructure penetration rate may differ from one region to another. We propose in this paper a new location service called Vehicle-Aided Location Service in urban environment (VALS) which resolves the problem of the shortage of infrastructure in some city districts. VALS replaces the missing Road-Side Units (RSU) with vehicles offering RSUs functionalities. It is based on a hierarchical and cluster-based design. Simulation results show that VALS achieves a high success ratio (86%), get most vehicles' data (82%) and a good position information level accuracy (less than 20 m) with a low RSU penetration rate (40%). 2016 IEEE. Scopus
- Published
- 2016
43. A GPS-less Framework for Localization and Coverage Maintenance in Wireless Sensor Networks
- Author
-
Hassan Mathkour, Imen Mahjri, Khalil Drira, Amine Dhraief, Abdelfettah Belghith, Équipe Services et Architectures pour Réseaux Avancés (LAAS-SARA), Laboratoire d'analyse et d'architecture des systèmes (LAAS), Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, Département informatique (INFO), Université européenne de Bretagne - European University of Brittany (UEB)-Télécom Bretagne-Institut Mines-Télécom [Paris] (IMT), College of Computer and Information Sciences [Riyadh], King Saud University [Riyadh] (KSU), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), and Université de Toulouse (UT)
- Subjects
Computer Networks and Communications ,Computer science ,GPS ,Real-time computing ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,02 engineering and technology ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,0202 electrical engineering, electronic engineering, information engineering ,Coverage configuration protocol ,business.industry ,Node (networking) ,[INFO.INFO-WB]Computer Science [cs]/Web ,020206 networking & telecommunications ,integrated localization and sensing coverage ,WSNs ,transmission range ,Transmission (telecommunications) ,Sensor node ,Assisted GPS ,Global Positioning System ,[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET] ,020201 artificial intelligence & image processing ,business ,Wireless sensor network ,Energy (signal processing) ,Information Systems - Abstract
International audience; Sensing coverage is a fundamental issue for Wireless Sensor Networks (WSNs). Several coverage configuration protocols have been developed; most of them presume the availability of precise knowledge about each node location via GPS receivers. However, equipping each sensor node with a GPS is very expensive in terms of both energy and cost. On the other hand, several GPS-less localization algorithms that aim at obtaining nodes locations with a low cost have been proposed. Although their deep correlation, sensing coverage and localization have long been treated separately. In this paper, we analyze, design and evaluate a novel integrated framework providing both localization and coverage guarantees for WSNs. We integrate the well-known Coverage Configuration Protocol CCP with an improved version of the localization algorithm AT-Dist. We enhanced the original specification of AT-Dist in order to guarantee the necessary localization accuracy required by CCP. In our proposed framework, a few number of nodes are assumed to know their exact positions and dynamically vary their transmission ranges. The remaining sensors positions are derived, as accurately as possible, using this little initial location information. All nodes positions (exact and derived) are then used as an input for the coverage module. Extensive simulation results show that, even with a very low anchor density, our proposal reaches the same performance and efficiency as the ideal CCP based on complete and precise knowledge of sensors coordinates. A preliminary version of this paper appeared in ANT 2014, June 2-5, Hasselt, Belgium. This version includes a concrete enhancement of the original specification of AT-Dist in order to guarantee the necessary localization accuracy required by CCP. Furthermore, we allowed anchors to vary their transmission ranges. Extensive simulations results are included to ascertain the performance of the integrated system.
- Published
- 2016
44. Internet of Things in Support of Public Safety Networks: Opportunities and Challenges
- Author
-
Amine Dhraief and Ikbal Chammakhi Msadaa
- Subjects
Engineering ,business.industry ,Internet privacy ,business ,Internet of Things ,Computer security ,computer.software_genre ,computer ,GeneralLiterature_MISCELLANEOUS - Abstract
Today, we are witnessing the dawn of the era of Internet of Things (IoT) where trillions of physical objects are expected to come online and communicate. Cisco goes even further by introducing the concept of Internet of Everything (IoE), which refers to people-to-people, machine-to-people and machine-to-machine communications.
- Published
- 2016
45. CHRA: a coloring based hierarchical routing algorithm
- Author
-
Hassan Mathkour, Bilel Derbel, Ahmad S. Al-Mogren, Dhouha Ghrab, Imen Jemili, Abdelfettah Belghith, Amine Dhraief, Heterogeneous Advanced Networking and Applications [Manouba] (HANAlab), Université de la Manouba [Tunisie] (UMA)-École Nationale des Sciences de l'Informatique [Manouba] (ENSI), Université de la Manouba [Tunisie] (UMA), College of Computer and Information Sciences [Riyadh], King Saud University [Riyadh] (KSU), Parallel Cooperative Multi-criteria Optimization (DOLPHIN), Inria Lille - Nord Europe, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 (CRIStAL), and Centrale Lille-Université de Lille-Centre National de la Recherche Scientifique (CNRS)-Centrale Lille-Université de Lille-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Optimization problem ,General Computer Science ,business.industry ,Computer science ,Distributed computing ,020208 electrical & electronic engineering ,020206 networking & telecommunications ,Computational intelligence ,02 engineering and technology ,Energy consumption ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,0202 electrical engineering, electronic engineering, information engineering ,Graph coloring ,[INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC] ,Heuristics ,business ,Wireless sensor network ,Hierarchical routing ,Computer network - Abstract
International audience; Graph coloring was exploited in wireless sensor networks to solve many optimization problems, mainly related to channel assignment. In this paper, we propose to use coloring to jointly manage channel access and routing to the sink. We introduce CHRA, a coloring based hierarchical routing approach. Coloring is exploited to avoid interferences and also to schedule nodes transmissions to the sink. We provide an analytical study assessing the performance of CHRA and present an investigation of various coloring heuristics to study their impact on CHRA performances on maintaining the network connectivity and coverage, while reducing the energy consumption.
- Published
- 2015
46. TCP Application Recovery Improvement After Handover in Mobile Networks
- Author
-
Amine Dhraief, Abdelfettah Belghith, and Hajer Souri
- Subjects
TCP acceleration ,Handover ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Zeta-TCP ,TCP tuning ,The Internet ,Context (language use) ,Session (computer science) ,business ,Host (network) ,Computer network - Abstract
Host and network mobility support mechanisms aim to provide a seamless access to Internet while end users are changing their point of attachment. When a mobile entity roams from a network to another, a handover occurs causing communication session discontinuity degrading real-time application performance. Assuming that such inconvenience is a congestion, TCP recovery is slow and careful. We have previously proposed a cooperation between TCP and MIPv6 and proved its efficiency through OMNeT++ simulations. In this paper, We study its efficiency in the context of mobile networks. Therefore, we implement xNEMO; a compliant implementation of NEtwork MObility Basic Support (NEMO BS) in OMNeT++. Besides, in order to enhance the performance of TCP application, we propose to modify the TCP behaviour after a recovery from a handover. Simulations show that the cooperation between TCP and NEMO BS reduces the Application Recovery Time and enhances the performance of the TCP application.
- Published
- 2015
47. City-Obstacles Impact on OLSR-Based Routing Protocols
- Author
-
Amine Dhraief, Abdelfettah Belghith, and Mohamed Belhassen
- Subjects
Routing protocol ,Static routing ,Geography ,Optimized Link State Routing Protocol ,Link-state routing protocol ,business.industry ,Wireless ad hoc network ,Routing table ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Interior gateway protocol ,Ad hoc wireless distribution service ,business ,Computer network - Abstract
Vehicle mobility in presence of obstructing obstacle is one of the main problems limiting the deployment of vehicular ad hoc networks. Indeed, in such a highly dynamic network, underlying routing protocols struggle to find valid routes towards destination nodes. In this paper, we evaluate the performance of Cartography Enhanced OLSR with obstacle awareness protocol (CE-OLSR-OA) as well as Position based OLSR (P-OLSR) and OLSRwith movement prediction (OLSR-MOPR) routing protocols in the context of an urban VANET with obstructing obstacles. In these three OLSR-based routing protocols, the awareness about nodes locations is differently utilized in order to sustain the stability of selected routes. Conducted simulations show the superiority of CE-OLSR compared to OLSR-MOPR and P-OLSR in terms of routes validity, throughput and end-to-end delay metrics. Furthermore, we show that CE-OLSR is more suitable to real time applications than OLSR-MOPR.
- Published
- 2015
48. HCBLS: A Hierarchical Cluster-Based Location Service in Urban Environment
- Author
-
Raik Aissaoui, Abdelfettah Belghith, Hassan Mathkour, Amine Dhraief, Hamid Menouar, Fethi Filali, and Adnan Abu-Dayya
- Subjects
Article Subject ,Computer Networks and Communications ,Computer science ,Message delivery ,Real-time computing ,Scalability ,Telecommunication ,TK5101-6720 ,Latency (engineering) ,Cluster analysis ,Urban environment ,Computer Science Applications ,Hierarchical clustering - Abstract
Vehicle location information is central to many location-based services and applications in VANETs. Tracking vehicles positions and maintaining an accurate up-to-date view of the entire network are not easy due to the high mobility of vehicles and consequently rapid topology changes. The design of a scalable, accurate, and efficient location service is still a very challenging issue. In this paper, we propose a lightweight hierarchical cluster-based location service in city environments (HCBLS). HCBLS integrates a logical clustering based on the city digital map and consequently does not involve extra signaling overhead. An advanced location update aggregation at different levels of the assumed hierarchy is adopted to maintain up-to-date and accurate location information. Simulation results show that HCBLS achieves much better performances than the Efficient Map-Based Location Service (EMBLS) and any regular (non-cluster-based) updating scheme. HCBLS increases the success rate by around 10%, improves the overview of the network by more than 30%, lowers the location update and query costs by more than 7 times, lowers the message delivery latency by around 3 times, and presents around 4 times better localization accuracy.
- Published
- 2015
- Full Text
- View/download PDF
49. Autonomic Obstacle Detection and Avoidance in MANETs Driven by Cartography Enhanced OLSR
- Author
-
Amine Dhraief, Abdelfettah Belghith, Mohamed Belhassen, Hassan Mathkour, and Nour Elhouda Dougui
- Subjects
Routing protocol ,Article Subject ,Computer Networks and Communications ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,TK5101-6720 ,Computer Science Applications ,Link-state routing protocol ,Optimized Link State Routing Protocol ,Obstacle ,Telecommunication ,Overhead (computing) ,A priori and a posteriori ,Routing (electronic design automation) ,Cartography ,Protocol (object-oriented programming) - Abstract
The presence of obstructing obstacles severely degrades the efficiency of routing protocols in MANETs. To mitigate the effect of these obstructing obstacles, routing in MANETs is usually based on thea prioriknowledge of the obstacle map. In this paper, we investigate rather the dynamic and autonomic detection of obstacles that might stand within the network. This is accomplished using the enhanced cartography optimized link state routing CE-OLSR with no extra signaling overhead. The evaluation of the performance of our proposed detection scheme is accomplished through extensive simulations using OMNET++. Results clearly show the ability of our proposed scheme to accurately delimit the obstacle area with high coverage and efficient precision ratios. Furthermore, we integrated the proposed scheme into CE-OLSR to make it capable of autonomously detecting and avoiding obstacles. Simulation results show the effectiveness of such an integrated protocol that provides the same route validity as that of CE-OLSR-OA which is based on thea prioriknowledge of the obstructing obstacle map.
- Published
- 2015
50. An M2M gateway-centric architecture for autonomic healing and optimising of machine-to-machine overlay networks
- Author
-
Hassan Mathkour, Khalil Drira, Abdelfettah Belghith, Amine Dhraief, Département informatique (INFO), Université européenne de Bretagne - European University of Brittany (UEB)-Télécom Bretagne-Institut Mines-Télécom [Paris] (IMT), College of Computer and Information Sciences [Riyadh], King Saud University [Riyadh] (KSU), Équipe Services et Architectures pour Réseaux Avancés (LAAS-SARA), Laboratoire d'analyse et d'architecture des systèmes (LAAS), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT), Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse 1 Capitole (UT1), and Université Fédérale Toulouse Midi-Pyrénées
- Subjects
Computer Networks and Communications ,Computer science ,computer.internet_protocol ,Distributed computing ,Overlay network ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,02 engineering and technology ,Overlay ,01 natural sciences ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Default gateway ,0202 electrical engineering, electronic engineering, information engineering ,Host Identity Protocol ,Session (computer science) ,Protocol (object-oriented programming) ,business.industry ,[INFO.INFO-WB]Computer Science [cs]/Web ,010401 analytical chemistry ,020206 networking & telecommunications ,0104 chemical sciences ,Machine to machine ,Hardware and Architecture ,[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET] ,business ,computer ,Software ,Computer network ,PATH (variable) - Abstract
International audience; The Machine-to-Machine (M2M) technology, currently under standardization at both the ETSI and 3GPP, is expected to be one of the most promising revenue-generating services. However, to ensure the wide spread of this technology, M2M communications should be secure, fault-tolerant and self-managed. In this work, we add to the M2M gateway (an aggregator node in the M2M architecture) the self-healing and self-optimizing autonomic capabilities. We couple at the M2M gateway level the Host Identity Protocal (HIP) with the Reachability Protocol (REAP). REAP enables a self-healed M2M communication as it detects possible failures and seamlessly rehomes an M2M established session to a new working overlay path. Furthermore, we modify REAP to ensure self-optimized M2M communications. REAP continuously monitors M2M overlay paths and always selects the best available ones in terms of RTT. We implement our solution on the OMNeT++ network simulator. Results show that M2M sessions effectively resume after an outage affecting their currently used M2M overlay paths. Results also highlight that M2M sessions autonomically select the best available M2M overlay paths.
- Published
- 2017
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.