13 results on '"Hicham Amraoui"'
Search Results
2. Moisture vulnerability of antenna operation in UHF band.
- Author
-
Mounir El Mejjatti, Ahmed Habbani, Bilal Essaid, and Hicham Amraoui
- Published
- 2017
- Full Text
- View/download PDF
3. Mobility quantification for MultiPoint Relays selection algorithm in Mobile Ad hoc Networks.
- Author
-
Hicham Amraoui, Ahmed Habbani, and Abdelmajid Hajami
- Published
- 2016
- Full Text
- View/download PDF
4. Effect of selfish behaviour on OLSR and AODV routing protocols in MANETs.
- Author
-
Hicham Amraoui, Ahmed Habbani, and Abdelmajid Hajami
- Published
- 2014
- Full Text
- View/download PDF
5. CCS: A Correct Cooperation Strategy based on game theory for MANETS.
- Author
-
Hicham Amraoui, Ahmed Habbani, and Abdelmajid Hajami
- Published
- 2014
- Full Text
- View/download PDF
6. Wireless Network Stability Enhancement Based on Spatial Dependency
- Author
-
Chaimae Benjbara, Ahmed Habbani, Hicham Amraoui, Nada Mouchfiq, and Halim Berradi
- Subjects
Routing protocol ,Optimized Link State Routing Protocol ,Wireless network ,Wireless ad hoc network ,business.industry ,Packet loss ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Manhattan mobility model ,Mobile ad hoc network ,Multipoint relay ,business ,Computer network - Abstract
The Ad hoc network is a part of the IoT environment, including several types of networks like MANET. It uses different categories of routing protocol, but the OLSR routing protocol is the best one for MANET. The mobility concept has an impact on the evolution of network performances. In the OLSR routing protocol, this mobility influences on the choice of the MultiPoint Relay (MPR). In this paper, the main objective is to develop an algorithm enhancing MPR selection process in such networks. This algorithm based on Average Spatial Dependency metric “ASD” linked to the average Relative Speed “RS” and the average Relative Acceleration “RA”. Each node shares these values with its neighbors using the messages of OLSR routing protocol (Hello and TC messages). Furthermore, if the nodes have equal reachability, the highest ASD value will be selected as a criterion of the choice of their MPR set. In the simulation, we have applicated the Manhattan mobility model in the MANET network, and we have used the NS3 simulator. The results of this simulation have shown that the mobility concept could change network performances in terms of packet loss, end-to-end delay, and Throughput.
- Published
- 2020
7. Reducing Network Topology over Smart Digital Mobile Environment Using Linear Programming Approach
- Author
-
Ahmed Habbani, Hicham Amraoui, and Abdelmajid Hajami
- Subjects
Routing protocol ,Optimized Link State Routing Protocol ,Link-state routing protocol ,Topology control ,business.industry ,Computer science ,Node (networking) ,Mobile technology ,Mobile ad hoc network ,Network topology ,business ,Computer network - Abstract
With the advances of mobile technologies, users must enjoy digital environment using smart mobile interfaces without any kind of restrictions. In addition, different users want to easily communicate and use media contents through the network platform. Recently, Mobile Ad hoc Networks (MANETs) where Optimized Link State Routing (OLSR) used as routing protocol, can be used to ensure communications in digital environment. In such networks, each node broadcasts the Topology Control (TC) messages to forward the network topology with other devices using a mechanism called MultiPoint Relays (MPR). However, the control traffic broadcasting method can influence different performances, and duplicate TC messages transmission will always exist. In this paper, we propose a minimization-based approach considering both the network overhead and energy consumption. The main goal of this solution is to provide users with smart mobile networking in order to optimize communications between different devices. Moreover, the proposal which is based on the linear programming approach, permits to control the duplicate TC transmission to prolong the network lifetime by saving the energy consumption in order to offer a smart digital environment.
- Published
- 2018
8. Security & cooperation mechanisms over mobile ad hoc networks: A survey and challenges
- Author
-
Hicham Amraoui, Abdelmajid Hajami, Ahmed Habbani, and Essaïd Bilal
- Subjects
business.industry ,Wireless ad hoc network ,Wireless network ,Computer science ,Mobile computing ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Mobile ad hoc network ,Computer security ,computer.software_genre ,0203 mechanical engineering ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Wireless ,The Internet ,business ,Mobile device ,computer - Abstract
In our everyday life, we are very interested in wireless connection technologies. In addition, the use of mobile devices and applications which are based on wireless networking is continuously increasing day after day. As the future Internet architecture, security concept can offer superior architectural support for Mobile Ad Hoc Networks (MANETs). Therefore, this concept, which is an important cross-cutting research field, is gradually forming. The key novelty of this paper, is to provide the references and guidelines to well guide the readers approaching studies on the new research fields about this concept. First of all, we introduce the background of MANETs and analyze its development trends, and then interpret security requirements and sketch an overview about challenges and attacks in such networks. Subsequently, we define, for the first time a new research field entitled Cooperative Internet of MANETs (CIMANET) which will be introduced as the new cross-cutting area. In addition, we provide a description of many existing security algorithms with a comparative analysis of these various mechanisms.
- Published
- 2017
9. Moisture vulnerability of antenna operation in UHF band
- Author
-
Bilal Essaid, Hicham Amraoui, Mounir El Mejjatti, Ahmed Habbani, Ecole Nationale Supérieure d'Informatique et d'Analyses des Systèmes (ENSIAS), Université Mohammed V de Rabat [Agdal] (UM5), École des Mines de Saint-Étienne (Mines Saint-Étienne MSE), Institut Mines-Télécom [Paris] (IMT), Environnement, Ville, Société (EVS), École normale supérieure de Lyon (ENS de Lyon)-École des Mines de Saint-Étienne (Mines Saint-Étienne MSE), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université Lumière - Lyon 2 (UL2)-Université Jean Moulin - Lyon 3 (UJML), Université de Lyon-Université de Lyon-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université Jean Monnet - Saint-Étienne (UJM)-École Nationale des Travaux Publics de l'État (ENTPE)-École nationale supérieure d'architecture de Lyon (ENSAL)-Centre National de la Recherche Scientifique (CNRS), SPIN-ENSMSE - Centre Sciences des Processus Industriels et Naturels (SPIN-ENSMSE), Ecole Nationale Supérieure des Mines de St Etienne (ENSM ST-ETIENNE), Département GéoSciences et Environnement (GSE-ENSMSE), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-SPIN, Département Procédés pour l'Environnement et Géoressources (PEG-ENSMSE), Centre Sciences des Processus Industriels et Naturels (SPIN-ENSMSE), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-École des Mines de Saint-Étienne (Mines Saint-Étienne MSE), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT), Université Mohamed V - Souissi, Environnement Ville Société (EVS), École normale supérieure - Lyon (ENS Lyon)-École des Mines de Saint-Étienne (Mines Saint-Étienne MSE), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université Jean Monnet [Saint-Étienne] (UJM)-École Nationale des Travaux Publics de l'État (ENTPE)-École nationale supérieure d'architecture de Lyon (ENSAL)-Centre National de la Recherche Scientifique (CNRS), and Ecole Nationale Supérieure des Mines de St Etienne
- Subjects
Electromagnetic field ,Permittivity ,[INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR] ,Materials science ,Moisture ,Acoustics ,Relative permittivity ,Directivity ,ACM: K.: Computing Milieux ,law.invention ,Electromagnetic ,soil ,Dipole ,law ,Antenna ,Electronic engineering ,[INFO]Computer Science [cs] ,Dipole antenna ,melting layer ,ACM: C.: Computer Systems Organization ,Water content - Abstract
International audience; Behavior of the propagation medium in reaction with electromagnetic fields is described by its dielectric permittivity; this electric property is a function of the physical characteristics of the medium and those of the propagating wave. Among the parameters, which considerably affect the dielectric permittivity of a medium, its water content. In fact, when the snow wetness varies from 0 to 50% in the melting layer, real part of the mixture permittivity varies from 1.47 to 5.86. Similarly, when soil moisture varies from 0 to 40% real and imaginary parts of effective permittivity of soil, air and water mixture vary from 4.13 to 24.85 and from 0 to 3.44 respectively. This dynamism in the permittivity as a function of the humidity is able to alter the efficiency of the antenna within the application. In this paper, we propose a study to analyze the impact of wetness on the performance of a dipole antenna with central frequency of 900 MHz. The study was carried out by simulating the behavior of the dipole antenna model in Finite Element Method (FEM) full wave simulator with different values of the water content of two propagation mediums: melting layer and soil. Simulation results concerning the resonant frequency, bandwidth, directivity are presented through paragraphs of the paper.
- Published
- 2017
10. Mobility quantification for MultiPoint Relays selection algorithm in Mobile Ad hoc Networks
- Author
-
Abdelmajid Hajami, Hicham Amraoui, and Ahmed Habbani
- Subjects
Routing protocol ,business.industry ,Wireless ad hoc network ,Computer science ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,05 social sciences ,050801 communication & media studies ,020206 networking & telecommunications ,02 engineering and technology ,Mobile ad hoc network ,Ad hoc wireless distribution service ,Multipoint relay ,0508 media and communications ,Optimized Link State Routing Protocol ,Packet loss ,0202 electrical engineering, electronic engineering, information engineering ,Destination-Sequenced Distance Vector routing ,business ,Computer network - Abstract
In Mobile Ad hoc Networks (MANETs), with Optimized Link State Routing Protocol (OLSR) the mobility concept is an essential element which can result in the evolution of network performances. In this paper, the main objective is to develop an algorithm to improve the MultiPoint Relay (MPR) selection process in such networks. This algorithm is based on the Mobility Rate (MR) which in turn is relied on the relative velocity of nodes. Additionally, in this algorithm, each node keeps a mobility rate record of other nodes. Moreover, this mobility value will be exchanged between nodes using OLSR messages (HELLO and Topology control (TC)). Furthermore, this value will be used as a criterion when a node chooses their MPR set. In addition, the simulation results using Network Simulator 3 (NS3) have shown that the mobility concept could improve network performances in terms of the throughput, packet received, packet loss, packet delivery ratio and packet forwarded. Moreover, and through this paper the proposed algorithm can be used as a functional mobility mechanism to improve network performances in MANETs.
- Published
- 2016
11. Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model
- Author
-
Ahmed Habbani, Essaïd Bilal, Hicham Amraoui, Abdelmajid Hajami, Laboratoire des Systèmes d'Informations Mobiles et Embarqués - SIME (Rabat, Maroc), Laboratoire d'Electronique et de Communications (LEC), Ecole Mahommadia d'Ingénieurs (EMI), Laboratoire de Veille des technologies Emergentes (LAVETE), Faculté des Sciences et Techniques [Settat] (FSTS), Université Hassan 1er [Settat]-Université Hassan 1er [Settat], Centre Sciences des Processus Industriels et Naturels (SPIN-ENSMSE), École des Mines de Saint-Étienne (Mines Saint-Étienne MSE), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT), Environnement, Ville, Société (EVS), École normale supérieure de Lyon (ENS de Lyon)-École des Mines de Saint-Étienne (Mines Saint-Étienne MSE), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université Lumière - Lyon 2 (UL2)-Université Jean Moulin - Lyon 3 (UJML), Université de Lyon-Université de Lyon-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université Jean Monnet - Saint-Étienne (UJM)-École Nationale des Travaux Publics de l'État (ENTPE)-École nationale supérieure d'architecture de Lyon (ENSAL)-Centre National de la Recherche Scientifique (CNRS), Département GéoSciences et Environnement (GSE-ENSMSE), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-SPIN, SIME Lab-MIS Team-ENSIAS-Université Mohammed V-Rabat-Maroc, LEC Lab-EMI-Université Mohammed V-Rabat-Maroc, LAVETE Lab-FST-Université Hassan I, Settat-Maroc, Environnement Ville Société (EVS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-École nationale supérieure d'architecture de Lyon (ENSAL)-École des Mines de Saint-Étienne (Mines Saint-Étienne MSE), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-École Nationale des Travaux Publics de l'État (ENTPE)-Université Jean Monnet [Saint-Étienne] (UJM)-Université Jean Moulin - Lyon 3 (UJML), and Université de Lyon-Université Lumière - Lyon 2 (UL2)-École normale supérieure - Lyon (ENS Lyon)
- Subjects
Article Subject ,Computer Networks and Communications ,Computer science ,Distributed computing ,MANETs ,Wireless Routing Protocol ,02 engineering and technology ,security ,TK5101-6720 ,Network simulation ,cooperation rate ,Schema (psychology) ,0202 electrical engineering, electronic engineering, information engineering ,[SPI.GPROC]Engineering Sciences [physics]/Chemical and Process Engineering ,Game theory ,[INFO.INFO-GT]Computer Science [cs]/Computer Science and Game Theory [cs.GT] ,business.industry ,mobile ad hoc networks ,020208 electrical & electronic engineering ,020206 networking & telecommunications ,Mobile ad hoc network ,Ad hoc wireless distribution service ,Computer Science Applications ,OLSR ,Optimized Link State Routing Protocol ,Telecommunication ,business ,CR ,Computer network - Abstract
Game theory may offer a useful mechanism to address many problems in mobile ad hoc networks (MANETs). One of the key concepts in the research field of such networks with Optimized Link State Routing Protocol (OLSR) is the security problem. Relying on applying game theory to study this problem, we consider two strategies during this suggested model: cooperate and not-cooperate. However, in such networks, it is not easy to identify different actions of players. In this paper, we have essentially been inspired from recent advances provided in game theory to propose a new model for security in MANETs. Our proposal presents a powerful tool with a large number of players where interactions are played multiple times. Moreover, each node keeps a cooperation rate (CR) record of other nodes to cope with the behaviors and mitigate aggregate effect of other malicious devices. Additionally, our suggested security mechanism does not only take into consideration security requirements, but also take into account system resources and network performances. The simulation results using Network Simulator 3 are presented to illustrate the effectiveness of the proposal.
- Published
- 2016
12. CCS: A Correct Cooperation Strategy based on game theory for MANETS
- Author
-
Ahmed Habbani, Hicham Amraoui, and Abdelmajid Hajami
- Subjects
Routing protocol ,Adaptive quality of service multi-hop routing ,Computer science ,Wireless ad hoc network ,business.industry ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Wireless Routing Protocol ,Mobile ad hoc network ,Ad hoc wireless distribution service ,Optimized Link State Routing Protocol ,Destination-Sequenced Distance Vector routing ,business ,Computer network - Abstract
Mobile ad hoc networks (MANETs) is a multihop wireless communication network supporting mobile users (nodes) without any existing infrastructure and depend of the individual behavior of the nodes. This nature of MANETs imposes the cooperation among nodes to improve quality of service and security especially that mobility and energy are the most important criteria in MANETs. In such networks, devices can have different configurations, and should cooperate to ensure the existence of such networks. Cooperation enforcement mechanism do not provide strong authentication of entities. However, cooperation may be more difficult to apply in MANETS than infrastructure based networks due to many reasons already mentioned. In this paper we'll present a correct strategy based on cooperation rate (CR) to enforce cooperation and communication between nodes in MANET using OLSR routing protocol. The concept of this strategy based on game theory is focused on track keeps by each nodes and calculate the CR of other nodes. The CR is calculated based on various types of OLSR messages (HELLO, TC, MID and HNA) sent among nodes, and also based on different network processing (forwarding and routing).
- Published
- 2014
13. Effect of selfish behaviour on OLSR and AODV routing protocols in MANETs
- Author
-
Ahmed Habbani, Abdelmajid Hajami, and Hicham Amraoui
- Subjects
Routing protocol ,Dynamic Source Routing ,Zone Routing Protocol ,Vehicular ad hoc network ,Adaptive quality of service multi-hop routing ,Wireless ad hoc network ,Network packet ,business.industry ,Computer science ,Distributed computing ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Wireless Routing Protocol ,Mobile ad hoc network ,Ad hoc wireless distribution service ,Optimized Link State Routing Protocol ,Link-state routing protocol ,Geocast ,Ad hoc On-Demand Distance Vector Routing ,Network performance ,Destination-Sequenced Distance Vector routing ,business ,Computer network - Abstract
In this paper, we'll try to discuss the cooperation of nodes representing one of the important factors in improving the quality of service (QoS) and security in mobile ad hoc networks (MANETs). The routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. In such networks, the Selfish behaviour is among the big challenges and can lead to the degradation of the network performance. We'll introduce this behaviour and. We'll propose a new profile to assess the impact on the performance of MANETs: energy, end-to-end delay, routing packets and the packets rate. The Results of simulations using OLSR and AODV protocols have shown that energy-based selfishness is a big problem and could affect the performance in MANETS depending on the mobility of nodes, size and density of the network. We'll try to prove that the selfish behaviour can be used to impact quality of service (QoS) and security in MANETS. Therefore, we need a comprehensive mechanism to cope with this behaviour to isolate selfishness nodes and we have planned to publish it in the future work as a new strategy based on game theory to encourage nodes to cooperate.
- Published
- 2014
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.