128 results on '"Nour, Boubakr"'
Search Results
2. Unsupervised Data Splitting Scheme for Federated Edge Learning in IoT Networks
- Author
-
Nour, Boubakr and Cherkaoui, Soumaya
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Federated Edge Learning (FEEL) is a promising distributed learning technique that aims to train a shared global model while reducing communication costs and promoting users' privacy. However, the training process might significantly occupy a long time due to the nature of the used data for training, which leads to higher energy consumption and therefore impacts the model convergence. To tackle this issue, we propose a data-driven federated edge learning scheme that tends to select suitable participating nodes based on quality data and energy. First, we design an unsupervised data-aware splitting scheme that partitions the node's local data into diverse samples used for training. We incorporate a similarity index to select quality data that enhances the training performance. Then, we propose a heuristic participating nodes selection scheme to minimize the communication and computation energy consumption, as well as the amount of communication rounds. The obtained results show that the proposed scheme substantially outperforms the vanilla FEEL in terms of energy consumption and the number of communication rounds., Comment: This paper has been accepted for publication by IEEE International Conference on Communications (ICC). The final version will be published by the IEEE
- Published
- 2022
3. Communication and Computation O-RAN Resource Slicing for URLLC Services Using Deep Reinforcement Learning
- Author
-
Filali, Abderrahime, Nour, Boubakr, Cherkaoui, Soumaya, and Kobbane, Abdellatif
- Subjects
Computer Science - Networking and Internet Architecture ,Electrical Engineering and Systems Science - Signal Processing - Abstract
The evolution of the future beyond-5G/6G networks towards a service-aware network is based on network slicing technology. With network slicing, communication service providers seek to meet all the requirements imposed by the verticals, including ultra-reliable low-latency communication (URLLC) services. In addition, the open radio access network (O-RAN) architecture paves the way for flexible sharing of network resources by introducing more programmability into the RAN. RAN slicing is an essential part of end-to-end network slicing since it ensures efficient sharing of communication and computation resources. However, due to the stringent requirements of URLLC services and the dynamics of the RAN environment, RAN slicing is challenging. In this article, we propose a two-level RAN slicing approach based on the O-RAN architecture to allocate the communication and computation RAN resources among URLLC end-devices. For each RAN slicing level, we model the resource slicing problem as a single-agent Markov decision process and design a deep reinforcement learning algorithm to solve it. Simulation results demonstrate the efficiency of the proposed approach in meeting the desired quality of service requirements.
- Published
- 2022
4. Matching-based Service Offloading for Compute-less Driven IoT Networks
- Author
-
Nour, Boubakr and Cherkaoui, Soumaya
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
With the advent of the Internet of Things (IoT) and 5G networks, edge computing is offering new opportunities for business model and use cases innovations. Service providers can now virtualize the cloud beyond the data center to meet the latency, data sovereignty, reliability, and interoperability requirements. Yet, many new applications (e.g., augmented reality, virtual reality, artificial intelligence) are computation-intensive and delay-sensitivity. These applications are invoked heavily with similar inputs that could lead to the same output. Compute-less networks aim to implement a network with a minimum amount of computation and communication. This can be realized by offloading prevalent services to the edge and thus minimizing communication in the core network and eliminating redundant computations using the computation reuse concept. In this paper, we present matching-based services offloading schemes for compute-less IoT networks. We adopt the matching theory to match service offloading to the appropriate edge server(s). Specifically, we design, WHISTLE, a vertical many-to-many offloading scheme that aims to offload the most invoked and highly reusable services to the appropriate edge servers. We further extend WHISTLE to provide horizontal one-to-many computation reuse sharing among edge servers which leads to bouncing less computation back to the cloud. We evaluate the efficiency and effectiveness of WHISTLE with a real-world dataset. The obtained findings show that WHISTLE is able to accelerate the tasks completion time by 20%, reduce the computation up to 77%, and decrease the communication up to 71%. Theoretical analyses also prove the stability of the designed schemes.
- Published
- 2022
5. A Network-based Compute Reuse Architecture for IoT Applications
- Author
-
Nour, Boubakr and Cherkaoui, Soumaya
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
The tremendous advancements in the Internet of Things (IoT) increasingly involve computationally intensive services. These services often require more computation resources than can entirely be satisfied on local IoT devices. Cloud computing is traditionally used to provide unlimited computation resources at distant servers. However, such remote computation may not address the short-delay constraints that many of today's IoT applications require. Edge computing allows offloading computing close to end users to overcome computation and delay issues. Nonetheless, the edge servers may suffer from computing inefficiencies. Indeed, some IoT applications are invoked multiple times by multiple devices. These invocations are often used with the same or similar input data, which leads to the same computational output (results). Still, the edge server willfully executes all received redundant tasks. In this work, we investigate the use of the computation reuse concept at the edge server. We design a network-based computation reuse architecture for IoT applications. The architecture stores previously executed results and reuses them to satisfy newly arrived similar tasks instead of performing computation from scratch. By doing so, we eliminate redundant computation, optimize resource utilization, and decrease task completion time. We implemented the architecture and evaluated its performance both at the networking and application levels. From the networking perspective, we reach up to an 80\% reduction in task completion time and up to 60\% reduction in resource utilization. From the application perspective, we achieve up to 90\% computation correctness and accuracy.
- Published
- 2021
6. Empowering Prosumer Communities in Smart Grid with Wireless Communications and Federated Edge Learning
- Author
-
Taik, Afaf, Nour, Boubakr, and Cherkaoui, Soumaya
- Subjects
Electrical Engineering and Systems Science - Signal Processing ,Computer Science - Artificial Intelligence ,Computer Science - Networking and Internet Architecture - Abstract
The exponential growth of distributed energy resources is enabling the transformation of traditional consumers in the smart grid into prosumers. Such transition presents a promising opportunity for sustainable energy trading. Yet, the integration of prosumers in the energy market imposes new considerations in designing unified and sustainable frameworks for efficient use of the power and communication infrastructure. Furthermore, several issues need to be tackled to adequately promote the adoption of decentralized renewable-oriented systems, such as communication overhead, data privacy, scalability, and sustainability. In this article, we present the different aspects and challenges to be addressed for building efficient energy trading markets in relation to communication and smart decision-making. Accordingly, we propose a multi-level pro-decision framework for prosumer communities to achieve collective goals. Since the individual decisions of prosumers are mainly driven by individual self-sufficiency goals, the framework prioritizes the individual prosumers' decisions and relies on the 5G wireless network for fast coordination among community members. In fact, each prosumer predicts energy production and consumption to make proactive trading decisions as a response to collective-level requests. Moreover, the collaboration of the community is further extended by including the collaborative training of prediction models using Federated Learning, assisted by edge servers and prosumer home-area equipment. In addition to preserving prosumers' privacy, we show through evaluations that training prediction models using Federated Learning yields high accuracy for different energy resources while reducing the communication overhead.
- Published
- 2021
- Full Text
- View/download PDF
7. How Far Can We Go in Compute-less Networking: Computation Correctness and Accuracy
- Author
-
Nour, Boubakr and Cherkaoui, Soumaya
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Emerging applications such as augmented reality and tactile Internet are compute-intensive and latency-sensitive, which hampers their running in constrained end devices alone or in the distant cloud. The stringent requirements of such application drove to the realization of Edge computing in which computation is offloaded near to users. Compute-less networking is an extension of edge computing that aims at reducing computation and abridging communication by adopting in-network computing and computation reuse. Computation reuse aims to cache the result of computations and use them to perform similar tasks in the future and, therefore, avoid redundant calculations and optimize the use of resources. In this paper, we focus on the correctness of the final output produced by computation reuse. Since the input might not be identical but similar, the reuse of previous computation raises questions about the accuracy of the final results. To this end, we implement a proof of concept to study and gauge the effectiveness and efficiency of computation reuse. We are able to reduce task completion time by up to 80% while ensuring high correctness. We further discuss open challenges and highlight future research directions., Comment: Accepted for publication by the IEEE Network Magazine
- Published
- 2021
8. Networking and Computing in Biomechanical Research: Challenges and Directions
- Author
-
Mastorakis, Spyridon, Skiadopoulos, Andreas, Shannigrahi, Susmit, Likens, Aaron, Nour, Boubakr, and Stergiou, Nicholas
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Biomechanics is a scientific discipline that studies the forces acting on a body and the effects they produce. In this paper, we bring together biomechanists and networking researchers to shed light into how research efforts in biomechanics, primarily related to the study of the human body, can be facilitated through networking and computing technologies, such as edge and cloud computing, Software Defined Networking, and Information-Centric Networking. We first present challenges related to networking and computing that biomechanists face today and we then describe how networking and computing technologies can address them. Finally, we identify directions for future networking research with a focus on biomechanics to facilitate and encourage interdisciplinary collaborations between biomechanists and networking researchers., Comment: Accepted for publication by the IEEE Communications Magazine
- Published
- 2021
9. Information-Centric Networking in Wireless Environments: Security Risks and Challenges
- Author
-
Nour, Boubakr, Mastorakis, Spyridon, Ullah, Rehmat, and Stergiou, Nicholas
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Information-Centric Networking (ICN) has emerged as a paradigm to cope with the lack of built-in security primitives and efficient mechanisms for content distribution of today's Internet. However, deploying ICN in a wireless environment poses a different set of challenges compared to a wired environment, especially when it comes to security. In this paper, we present the security issues that may arise and the attacks that may occur from different points of view when ICN is deployed in wireless environments. The discussed attacks may target both applications and the ICN network itself by exploiting elements of the ICN architecture, such as content names and in-network content caches. Furthermore, we discuss potential solutions to the presented issues and countermeasures to the presented attacks. Finally, we identify future research opportunities and directions., Comment: This paper has been accepted for publication by the IEEE Wireless Communications Magazine. The final version will be published by the IEEE
- Published
- 2021
10. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks
- Author
-
Churcher, Andrew, Ullah, Rehmat, Ahmad, Jawad, Rehman, Sadaqat ur, Masood, Fawad, Gogate, Mandar, Alqahtani, Fehaid, Nour, Boubakr, and Buchanan, William J.
- Subjects
Computer Science - Cryptography and Security ,Computer Science - Machine Learning - Abstract
In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is often overlooked. This has resulted in attackers having an increased incentive to target IoT devices. As the number of attacks possible on a network increases, it becomes more difficult for traditional intrusion detection systems (IDS) to cope with these attacks efficiently. In this paper, we highlight several machine learning (ML) methods such as k-nearest neighbour (KNN), support vector machine (SVM), decision tree (DT), naive Bayes (NB), random forest (RF), artificial neural network (ANN), and logistic regression (LR) that can be used in IDS. In this work, ML algorithms are compared for both binary and multi-class classification on Bot-IoT dataset. Based on several parameters such as accuracy, precision, recall, F1 score, and log loss, we experimentally compared the aforementioned ML algorithms. In the case of HTTP distributed denial-of-service (DDoS) attack, the accuracy of RF is 99%. Furthermore, other simulation results-based precision, recall, F1 score, and log loss metric reveal that RF outperforms on all types of attacks in binary classification. However, in multi-class classification, KNN outperforms other ML algorithms with an accuracy of 99%, which is 4% higher than RF.
- Published
- 2021
- Full Text
- View/download PDF
11. Access Control Mechanisms in Named Data Networks: A Comprehensive Survey
- Author
-
Nour, Boubakr, Khelifi, Hakima, Hussain, Rasheed, Mastorakis, Spyridon, and Moungla, Hassine
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content from its original location. This phenomenon leads to the loss of control over the content causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this paper, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories: Encryption-based AC and Encryption-independent AC. Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Name-based AC, Identity-based AC, etc). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community., Comment: This paper has been accepted for publication by the ACM Computing Surveys. The final version will be published by the ACM
- Published
- 2020
12. CCIC-WSN: An Architecture for Single Channel Cluster-based Information-Centric Wireless Sensor Networks
- Author
-
Rehman, Muhammad Atif Ur, Ullah, Rehmat, Kim, Byung-Seo, Nour, Boubakr, and Mastorakis, Spyridon
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
The promising vision of Information-Centric Networking (ICN) and of its realization, Named Data Networking (NDN), has attracted extensive attention in recent years in the context of the Internet of Things (IoT) and Wireless Sensor Networks (WSNs). However, a comprehensive NDN/ICN-based architectural design for WSNs, including specially tailored naming schemes and forwarding mechanisms, has yet to be explored. In this paper, we present single-Channel Cluster-based Information-Centric WSN (CCIC-WSN), an NDN/ICN-based framework to fulfill the requirements of cluster-based WSNs, such as communication between child nodes and cluster heads, association of new child nodes with cluster heads, discovery of the namespace of newly associated nodes, and child node mobility. Through an extensive simulation study, we demonstrate that CCIC-WSN achieves 71-90% lower energy consumption and 74-96% lower data retrieval delays than recently proposed frameworks for NDN/ICN-based WSNs under various evaluation settings., Comment: This paper has been accepted for publication by the IEEE Internet of Things Journal. The copyright is with IEEE and the final version will be published by IEEE
- Published
- 2020
13. Driving Path Stability in VANETs
- Author
-
Laroui, Mohammed, Sellami, Akrem, Nour, Boubakr, Moungla, Hassine, Afifi, Hossam, and Hacene, Sofiane B.
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Vehicular Ad Hoc Network has attracted both research and industrial community due to its benefits in facilitating human life and enhancing the security and comfort. However, various issues have been faced in such networks such as information security, routing reliability, dynamic high mobility of vehicles, that influence the stability of communication. To overcome this issue, it is necessary to increase the routing protocols performances, by keeping only the stable path during the communication. The effective solutions that have been investigated in the literature are based on the link prediction to avoid broken links. In this paper, we propose a new solution based on machine learning concept for link prediction, using LR and Support Vector Regression (SVR) which is a variant of the Support Vector Machine (SVM) algorithm. SVR allows predicting the movements of the vehicles in the network which gives us a decision for the link state at a future time. We study the performance of SVR by comparing the generated prediction values against real movement traces of different vehicles in various mobility scenarios, and to show the effectiveness of the proposed method, we calculate the error rate. Finally, we compare this new SVR method with Lagrange interpolation solution.
- Published
- 2019
- Full Text
- View/download PDF
14. A Federated Filtering Framework for Internet of Medical Things
- Author
-
Sanyal, Sunny, Wu, Dapeng, and Nour, Boubakr
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Based on the dominant paradigm, all the wearable IoT devices used in the healthcare sector also known as the internet of medical things (IoMT) are resource constrained in power and computational capabilities. The IoMT devices are continuously pushing their readings to the remote cloud servers for real-time data analytics, that causes faster drainage of the device battery. Moreover, other demerits of continuous centralizing of data include exposed privacy and high latency. This paper presents a novel Federated Filtering Framework for IoMT devices which is based on the prediction of data at the central fog server using shared models provided by the local IoMT devices. The fog server performs model averaging to predict the aggregated data matrix and also computes filter parameters for local IoMT devices. Two significant theoretical contributions of this paper are the global tolerable perturbation error (${To{l_F}}$) and the local filtering parameter ($\delta$); where the former controls the decision-making accuracy due to eigenvalue perturbation and the later balances the tradeoff between the communication overhead and perturbation error of the aggregated data matrix (predicted matrix) at the fog server. Experimental evaluation based on real healthcare data demonstrates that the proposed scheme saves upto 95\% of the communication cost while maintaining reasonable data privacy and low latency., Comment: 6 pages, 6 Figures, accepted for oral presentation in IEEE ICC 2019, Internet of Things, Federated Learning and Perturbation theory
- Published
- 2019
- Full Text
- View/download PDF
15. IoT Virtualization: A Survey of Software Definition & Function Virtualization Techniques for Internet of Things
- Author
-
Alam, Iqbal, Sharif, Kashif, Li, Fan, Latif, Zohaib, Karim, Md Monjurul, Nour, Boubakr, Biswas, Sujit, and Wang, Yu
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Internet of Things (IoT) and Network Softwarization are fast becoming core technologies of information systems and network management for next generation Internet. The deployment and applications of IoT ranges from smart cities to urban computing, and from ubiquitous healthcare to tactile Internet. For this reason the physical infrastructure of heterogeneous network systems has become more complicated, and thus requires efficient and dynamic solutions for management, configuration, and flow scheduling. Network softwarization in the form of Software Defined Networks (SDN) and Network Function Virtualization (NFV) has been extensively researched for IoT in recent past. In this article we present a systematic and comprehensive review of virtualization techniques explicitly designed for IoT networks. We have classified the literature into software defined networks designed for IoT, function virtualization for IoT networks, and software defined IoT networks. These categories are further divided into works which present architectural, security, and management solutions. In addition, the paper highlights a number of short term and long term research challenges and open issues related to adoption of software defined Internet of things., Comment: Initial version. An update is in progress
- Published
- 2019
16. CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters
- Author
-
GholipourChoubeh, Mahmood, primary, Kermabon-Bobinnec, Hugo, additional, Majumdar, Suryadipta, additional, Jarraya, Yosr, additional, Wang, Lingyu, additional, Nour, Boubakr, additional, and Pourzandi, Makan, additional
- Published
- 2024
- Full Text
- View/download PDF
17. PbCP: A profit-based cache placement scheme for next-generation IoT-based ICN networks
- Author
-
Serhane, Oussama, Yahyaoui, Khadidja, Nour, Boubakr, Hussain, Rasheed, Kazmi, Syed Muhammad Ahsan, and Moungla, Hassine
- Published
- 2022
- Full Text
- View/download PDF
18. A Latin rectangles-based TSCH scheduling and interference mitigation design
- Author
-
Boucetta, Chérifa, Nour, Boubakr, Sortais, Michel, and Moungla, Hassine
- Published
- 2021
- Full Text
- View/download PDF
19. Internet of Vehicles Over Named Data Networking: Current Status and Future Challenges
- Author
-
Kerrche, Chaker Abdelaziz, Ahmad, Farhan, Elhoseny, Mohamed, Adnane, Asma, Ahmad, Zeeshan, Nour, Boubakr, Kacprzyk, Janusz, Series Editor, Elhoseny, Mohamed, editor, and Hassanien, Aboul Ella, editor
- Published
- 2020
- Full Text
- View/download PDF
20. A blockchain-based architecture for secure vehicular Named Data Networks
- Author
-
Khelifi, Hakima, Luo, Senlin, Nour, Boubakr, Moungla, Hassine, Ahmed, Syed Hassan, and Guizani, Mohsen
- Published
- 2020
- Full Text
- View/download PDF
21. A unified hybrid information-centric naming scheme for IoT applications
- Author
-
Nour, Boubakr, Sharif, Kashif, Li, Fan, Moungla, Hassine, and Liu, Yang
- Published
- 2020
- Full Text
- View/download PDF
22. Vehicular Networks in the Eyes of Future Internet Architectures
- Author
-
Khelifi, Hakima, primary, Luo, Senlin, additional, Nour, Boubakr, additional, Moungla, Hassine, additional, and Ahmed, Syed Hassan, additional
- Published
- 2021
- Full Text
- View/download PDF
23. A survey of Internet of Things communication using ICN: A use case perspective
- Author
-
Nour, Boubakr, Sharif, Kashif, Li, Fan, Biswas, Sujit, Moungla, Hassine, Guizani, Mohsen, and Wang, Yu
- Published
- 2019
- Full Text
- View/download PDF
24. M2HAV: A Standardized ICN Naming Scheme for Wireless Devices in Internet of Things
- Author
-
Nour, Boubakr, Sharif, Kashif, Li, Fan, Moungla, Hassine, Liu, Yang, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Ma, Liran, editor, Khreishah, Abdallah, editor, Zhang, Yan, editor, and Yan, Mingyuan, editor
- Published
- 2017
- Full Text
- View/download PDF
25. A Survey on Threat Hunting in Enterprise Networks.
- Author
-
Nour, Boubakr, Pourzandi, Makan, and Debbabi, Mourad
- Published
- 2023
- Full Text
- View/download PDF
26. Internet of Vehicles Over Named Data Networking: Current Status and Future Challenges
- Author
-
Kerrche, Chaker Abdelaziz, primary, Ahmad, Farhan, additional, Elhoseny, Mohamed, additional, Adnane, Asma, additional, Ahmad, Zeeshan, additional, and Nour, Boubakr, additional
- Published
- 2019
- Full Text
- View/download PDF
27. Communication and Computation O-RAN Resource Slicing for URLLC Services Using Deep Reinforcement Learning
- Author
-
Filali, Abderrahime, primary, Nour, Boubakr, additional, Cherkaoui, Soumaya, additional, and Kobbane, Abdellatif, additional
- Published
- 2023
- Full Text
- View/download PDF
28. Federated Learning and Proactive Computation Reuse at the Edge of Smart Homes
- Author
-
Nour, Boubakr, primary, Cherkaoui, Soumaya, additional, and Mlika, Zoubeir, additional
- Published
- 2022
- Full Text
- View/download PDF
29. How Far Can We Go in Compute-less Networking: Computation Correctness and Accuracy
- Author
-
Nour, Boubakr, primary and Cherkaoui, Soumaya, additional
- Published
- 2022
- Full Text
- View/download PDF
30. M2HAV: A Standardized ICN Naming Scheme for Wireless Devices in Internet of Things
- Author
-
Nour, Boubakr, primary, Sharif, Kashif, additional, Li, Fan, additional, Moungla, Hassine, additional, and Liu, Yang, additional
- Published
- 2017
- Full Text
- View/download PDF
31. Unsupervised Data Splitting Scheme for Federated Edge Learning in IoT Networks
- Author
-
Nour, Boubakr, primary and Cherkaoui, Soumaya, additional
- Published
- 2022
- Full Text
- View/download PDF
32. Empowering Prosumer Communities in Smart Grid with Wireless Communications and Federated Edge Learning
- Author
-
Taik, Afaf, primary, Nour, Boubakr, additional, and Cherkaoui, Soumaya, additional
- Published
- 2021
- Full Text
- View/download PDF
33. Edge and fog computing for IoT: A survey on current research activities & future directions
- Author
-
Laroui, Mohammed, primary, Nour, Boubakr, additional, Moungla, Hassine, additional, Cherif, Moussa A., additional, Afifi, Hossam, additional, and Guizani, Mohsen, additional
- Published
- 2021
- Full Text
- View/download PDF
34. ICN Communication Optimization for Internet of Things
- Author
-
Nour, Boubakr, Beijing Institute of Technology (BIT), Beijing Institute of Technology, Fan Li, and Nour, Boubakr
- Subjects
Named Data Networking ,CCN ,IoT ,FIA ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Internet of Things ,Information-Centric Networking ,Content-Centric Networking ,NDN ,Future Internet Architecture ,ICN - Abstract
The Internet of Things (IoT) has gained extensive attention from both industry and academia in the past decade. The connectivity of each and every piece of technology in the environment with the Internet has opened many avenues of research and development. However, one thing still remains the same: host-centric communication, since it is the predominant way of communication on the Internet. However, host-centric communication is still the predominant Internet communication method. With the evolution of everything else, host-based communication has been stretched to limits, and the exploration of new models has been underway for several years. Information-Centric Networking (ICN) is a major contender for future Internet architecture, where content is the basic key/central/main regardless of its location. ICN intends to offer content-based naming, in-network caching, inherent mobility support, multicast support, and content-based security as part of the design and not an add-on functionality. On the other hand, most IoT applications inherently follow a content-oriented paradigm. IoT users or things ask for the content and consume the generated data from the network instead of communicating with a specific host or device, such as the retrieval of sensed values from a sensor, or monitoring the status of a patient in their home. In fact, ICN can facilitate large-scale IoT deployment, by improving network performance & scalability, enhance security & mobility, and optimize the energy consumption of devices. In recent years, numerous efforts have been made to integrate ICN with IoT. Nevertheless, new issues, due to the nature of IoT applications and the working principle of ICN, have emerged slowing down the ambitions besides using the ICN paradigm in IoT environments.In this thesis, we investigate and explore the possibilities to use ICN as a communication enabler for IoT applications. Inspired by the extensive research results in IoT-based ICN, we provide a detailed and systematic review of this merger. Furthermore, we identify a set of challenges and issues which we classify into two main classes: Network Communication and Network Management. For instance, we find that content naming -- the pillar element in ICN architecture, publish-subscribe communication -- a dominant communication model in IoT applications, and content caching scheme -- a fundamental building block in ICN network, can be listed in the network communication class, whereas control protocol -- an indispensable protocol for large-scale networks, can be arranged in the network management class. The core contributions and innovations of this thesis are as follows:(1) In order to overcome ICN naming issues such as identifying content/service/devices, producing long and unbounded names, and performing efficient aggregation rules, we propose a unified hybrid ICN naming scheme for IoT applications. The proposed scheme incorporates a prefix-labeling method to describe hierarchical location names and applies a variable-length encoding method to produce short names with various embedded semantic functionalities using attribute-value design. Moreover, the scheme supports fast local IoT communication using the Name-to-Code translation concept that tends to tackle long name-prefix issues, as well as multi-source content retrieval through the in-network function concept that aims at fetching content from multiple producers with a smaller number of packets and overhead. The simulation results show that the proposed scheme is inherently better than the existing state-of-the-art solutions and drastically reduces the memory consumption, lookup time, routing and forwarding overhead, and enhances the overall IoT communication.(2) In order to support publish-subscribe communication in ICN, we propose a group-based subscription scheme. The proposed scheme enables not only a seamless publisher-subscriber model, but also authentication, access control, and group management features. Without violating the single request-response ICN communication primitive, we design a scalable subscription management scheme using semi-persistent packets and specialized tables at intermediate nodes. The scheme also adopts the Logical Key Hierarchy mechanism to efficiently distribute security keys and secure content sharing among the authorized subscribers. Compared to traditional pull-based subscription, the proposed scheme is able to achieve lower control overhead, with added security and privacy features. The performance analysis shows that with semi-persistent interest, the memory requirements of the core nodes can be kept at minimal levels. (3) In order to design an efficient content caching schemes for IoT applications, we propose centralized and distributed in-network content caching schemes. The centralized scheme aims at selecting the most suitable placement to cache content by minimizing the cost of moving content from the original producer to the intermediate cache-store and from the cache-store to consumers, as well as minimizing the caching cost at intermediate nodes. The designed heuristic algorithm, Highest-First Farthest-Later, selects intermediate nodes with the highest demands, free cache memory as well as they are far away to satisfy a maximum number of demands. The second distributed scheme, Push Down Popular Push Up Less-Popular, aims at pushing down the popular content into the edge network and keeping the less-popular content in the core network. The obtained results show the efficiency and superiority of our scheme against similar strategies in terms of network delay, hop reduction, and cache utilization.(4) In order to design a control protocol compatible with the design principle of ICN, we propose a control protocol for named data networks that can relay different network error, information, notification, and service messages. Our protocol uses content name instead of host address, compatible with the interest-data exchange model and ICN forwarding plane, and supports interest aggregations. The protocol defines a new type of control packet that contains ControlClass and ControlType fields to specify the class of control message and its type. We define three main classes of control messages: Standard Error Messages, Notification Messages, and Service Messages. Each class has a set of messages based on class and usage. The designed protocol improves the network performance especially in the IoT environment, and can easily be extended to support different information-centric platforms.In conclusion, this dissertation studies the applicability of ICN as a communication enabler for IoT. It proposes a series of schemes for different ICN aspects (i.e., naming, communication model, in-network caching, and control protocol) that aim at providing a seamless and efficient IoT-based ICN network. Qualitative analyses and extensive experiments prove the efficiency of our schemes that outperform the existing solutions and exhibit better system performance with less overhead and added features., L'Internet des objets (IoT) a beaucoup retenu l'attention de l'industrie et du monde universitaire au cours de la dernière décennie. La connectivité de chaque élément technologique de l'environnement avec Internet a ouvert de nombreuses voies de recherche et développement. Cependant, une chose reste la même: la communication centrée sur l'hôte, car c'est le moyen de communication prédominant sur Internet. Cependant, la communication centrée sur l'hôte reste la méthode de communication Internet prédominante. Avec l'évolution de tout le reste, la communication basée sur l'hôte a été poussée à ses limites et l'exploration de nouveaux modèles est en cours depuis plusieurs années. Le réseau centré sur l'information (ICN) est un concurrent majeur pour la future architecture Internet, où le contenu est la clé de base / central / principal quel que soit son emplacement. ICN a l'intention de proposer la dénomination basée sur le contenu, la mise en cache en réseau, la prise en charge de la mobilité inhérente, la prise en charge de la multidiffusion et la sécurité basée sur le contenu dans le cadre de la conception et non comme une fonctionnalité complémentaire. D'autre part, la plupart des applications IoT suivent intrinsèquement un paradigme orienté contenu. Les utilisateurs ou objets de l'IoT demandent le contenu et consomment les données générées à partir du réseau au lieu de communiquer avec un hôte ou un appareil spécifique, comme la récupération des valeurs détectées à partir d'un capteur ou la surveillance de l'état d'un patient chez lui. En fait, ICN peut faciliter le déploiement de l'IoT à grande échelle, en améliorant les performances et l'évolutivité du réseau, en améliorant la sécurité et la mobilité, et en optimisant la consommation d'énergie des appareils. Ces dernières années, de nombreux efforts ont été faits pour intégrer ICN à l'IoT. Néanmoins, de nouveaux problèmes, en raison de la nature des applications IoT et du principe de fonctionnement d'ICN, sont apparus, ralentissant les ambitions en plus de l'utilisation du paradigme ICN dans les environnements IoT.Dans cette thèse, nous étudions et explorons les possibilités d'utiliser ICN comme facilitateur de communication pour les applications IoT. Inspirés par les résultats de recherche approfondis dans ICN basé sur l'IoT, nous fournissons une revue détaillée et systématique de cette fusion. En outre, nous identifions un ensemble de défis et de problèmes que nous classons en deux catégories principales: la communication réseau et la gestion de réseau. Par exemple, nous constatons que la dénomination de contenu - l'élément pilier de l'architecture ICN, la communication de publication-abonnement - un modèle de communication dominant dans les applications IoT et le schéma de mise en cache de contenu - un élément fondamental du réseau ICN, peut être répertoriée dans le la classe de communication réseau, tandis que le protocole de contrôle - un protocole indispensable pour les réseaux à grande échelle, peut être organisé dans la classe de gestion de réseau.Les principales contributions et innovations de cette thèse sont les suivantes:(1) Afin de surmonter les problèmes de dénomination ICN tels que l'identification du contenu / service / des appareils, la production de noms longs et illimités et l'application de règles d'agrégation efficaces, nous proposons un schéma de dénomination ICN hybride unifié pour les applications IoT. Le schéma proposé incorpore une méthode d'étiquetage de préfixe pour décrire les noms d'emplacement hiérarchiques et applique une méthode de codage à longueur variable pour produire des noms courts avec diverses fonctionnalités sémantiques intégrées à l'aide de la conception attribut-valeur. De plus, le système prend en charge la communication IoT locale rapide à l'aide du concept de traduction de nom en code qui tend à résoudre les problèmes de préfixe de nom long, ainsi que la récupération de contenu multi-source via le concept de fonction en réseau qui vise à récupérer le contenu de plusieurs producteurs avec un plus petit nombre de paquets et des frais généraux. Les résultats de la simulation montrent que le schéma proposé est intrinsèquement meilleur que les solutions de pointe existantes et réduit considérablement la consommation de mémoire, le temps de recherche, la surcharge de routage et de transfert, et améliore la communication IoT globale.(2) Afin de prendre en charge la communication de publication-abonnement dans ICN, nous proposons un système d'abonnement basé sur un groupe. Le schéma proposé permet non seulement un modèle d'éditeur-abonné transparent, mais également des fonctionnalités d'authentification, de contrôle d'accès et de gestion de groupe. Sans violer la primitive de communication ICN requête-réponse unique, nous concevons un schéma de gestion d'abonnement évolutif utilisant des paquets semi-persistants et des tables spécialisées au niveau des nœuds intermédiaires. Le schéma adopte également le mécanisme de hiérarchie de clés logiques pour distribuer efficacement les clés de sécurité et sécuriser le partage de contenu entre les abonnés autorisés. Par rapport à l'abonnement traditionnel basé sur pull, le système proposé est capable de réduire les frais de contrôle, avec des fonctionnalités de sécurité et de confidentialité supplémentaires. L'analyse des performances montre qu'avec un intérêt semi-persistant, les besoins en mémoire des nœuds principaux peuvent être maintenus à des niveaux minimaux.(3) Afin de concevoir des schémas de mise en cache de contenu efficaces pour les applications IoT, nous proposons des schémas de mise en cache de contenu en réseau centralisés et distribués. Le schéma centralisé vise à sélectionner l'emplacement le plus approprié pour mettre en cache le contenu en minimisant le coût de déplacement du contenu du producteur d'origine vers le cache-store intermédiaire et du cache-store vers les consommateurs, ainsi qu'en minimisant le coût de mise en cache aux nœuds intermédiaires. L'algorithme heuristique conçu, le plus élevé en premier le plus éloigné, sélectionne les nœuds intermédiaires avec les demandes les plus élevées, la mémoire cache libre ainsi que leur éloignement pour satisfaire un nombre maximal de demandes. Le deuxième système distribué, Push Down Popular Push Up Less-Popular, vise à pousser le contenu populaire vers le réseau périphérique et à conserver le contenu le moins populaire dans le réseau central. Les résultats obtenus montrent l'efficacité et la supériorité de notre schéma par rapport à des stratégies similaires en termes de délai réseau, de réduction des sauts et d'utilisation du cache.(4) Afin de concevoir un protocole de contrôle compatible avec le principe de conception d'ICN, nous proposons un protocole de contrôle pour les réseaux de données nommés qui peuvent relayer différents messages d'erreur réseau, d'informations, de notification et de service. Notre protocole utilise le nom du contenu au lieu de l'adresse de l'hôte, compatible avec le modèle d'échange de données d'intérêt et le plan de transfert ICN, et prend en charge les agrégations d'intérêts. Le protocole définit un nouveau type de paquet de contrôle qui contient des champs ControlClass et ControlType pour spécifier la classe du message de contrôle et son type. Nous définissons trois classes principales de messages de contrôle: les messages d'erreur standard, les messages de notification et les messages de service. Chaque classe a un ensemble de messages basés sur la classe et l'utilisation. Le protocole conçu améliore les performances du réseau, en particulier dans l'environnement IoT, et peut facilement être étendu pour prendre en charge différentes plates-formes centrées sur l'information.En conclusion, cette thèse étudie l'applicabilité de l'ICN en tant que facilitateur de communication pour l'IoT. Il propose une série de schémas pour différents aspects ICN (c'est-à-dire la dénomination, le modèle de communication, la mise en cache dans le réseau et le protocole de contrôle) qui visent à fournir un réseau ICN transparent et efficace basé sur l'IoT. Des analyses qualitatives et des expériences approfondies prouvent l'efficacité de nos systèmes qui surpassent les solutions existantes et présentent de meilleures performances système avec moins de frais généraux et des fonctionnalités supplémentaires.
- Published
- 2020
35. Coexistence of ICN and IP networks: An NFV as a service approach
- Author
-
Nour, Boubakr, Li, Fan, Khelifi, Hakima, Moungla, Hassine, Ksentini, Adlen, Nour, Boubakr, Li, Fan, Khelifi, Hakima, Moungla, Hassine, and Ksentini, Adlen
- Published
- 2019
36. Whispering: Joint Service Offloading and Computation Reuse in Cloud-Edge Networks
- Author
-
Nour, Boubakr, primary, Mastorakis, Spyridon, additional, and Mtibaa, Abderrahmen, additional
- Published
- 2021
- Full Text
- View/download PDF
37. QoS in IoT Networks based on Link Quality Prediction
- Author
-
Boucetta, Cherifa, primary, Nour, Boubakr, additional, Cusin, Alberic, additional, and Moungla, Hassine, additional
- Published
- 2021
- Full Text
- View/download PDF
38. Networking and Computing in Biomechanical Research: Challenges and Directions
- Author
-
Mastorakis, Spyridon, primary, Skiadopoulos, Andreas, additional, Shannigrahi, Susmit, additional, Likens, Aaron, additional, Nour, Boubakr, additional, and Stergiou, Nicholas, additional
- Published
- 2021
- Full Text
- View/download PDF
39. CoxNet: A Computation Reuse Architecture at the Edge
- Author
-
Bellal, Zouhir, primary, Nour, Boubakr, additional, and Mastorakis, Spyridon, additional
- Published
- 2021
- Full Text
- View/download PDF
40. Energy-aware Cache Placement Scheme for IoT-based ICN Networks
- Author
-
Serhane, Oussama, primary, Yahyaoui, Khadidja, additional, Nour, Boubakr, additional, and Moungla, Hassine, additional
- Published
- 2021
- Full Text
- View/download PDF
41. CCIC-WSN: An Architecture for Single-Channel Cluster-Based Information-Centric Wireless Sensor Networks
- Author
-
Rehman, Muhammad Atif Ur, primary, Ullah, Rehmat, additional, Kim, Byung-Seo, additional, Nour, Boubakr, additional, and Mastorakis, Spyridon, additional
- Published
- 2021
- Full Text
- View/download PDF
42. Access Control Mechanisms in Named Data Networks
- Author
-
Nour, Boubakr, primary, Khelifi, Hakima, additional, Hussain, Rasheed, additional, Mastorakis, Spyridon, additional, and Moungla, Hassine, additional
- Published
- 2021
- Full Text
- View/download PDF
43. Information-Centric Networking in Wireless Environments: Security Risks and Challenges
- Author
-
Nour, Boubakr, primary, Mastorakis, Spyridon, additional, Ullah, Rehmat, additional, and Stergiou, Nicholas, additional
- Published
- 2021
- Full Text
- View/download PDF
44. Named data networking in vehicular ad hoc networks: State-of-the-art and challenges
- Author
-
Khelifi, Hakima, Luo, Senlin, Nour, Boubakr, Moungla, Hassine, Faheem, Yasir, Hussain, Rasheed, Ksentini, Adlen, Khelifi, Hakima, Luo, Senlin, Nour, Boubakr, Moungla, Hassine, Faheem, Yasir, Hussain, Rasheed, and Ksentini, Adlen
- Published
- 2019
45. Access Control Mechanisms in Named Data Networks: A Comprehensive Survey.
- Author
-
NOUR, BOUBAKR, KHELIFI, HAKIMA, HUSSAIN, RASHEED, MASTORAKIS, SPYRIDON, and MOUNGLA, HASSINE
- Subjects
- *
ACCESS control , *WORKING class , *COMMUNICATION models , *SCIENTIFIC community - Abstract
Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean-slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content fromits original location. This phenomenon leads to the loss of control over the content, causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this article, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security, and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories: Encryption-based AC and Encryption-independent AC. Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Namebased AC, Identity-based AC). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
46. A Survey of ICN Content Naming and In-Network Caching in 5G and Beyond Networks
- Author
-
Serhane, Oussama, primary, Yahyaoui, Khadidja, additional, Nour, Boubakr, additional, and Moungla, Hassine, additional
- Published
- 2021
- Full Text
- View/download PDF
47. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks
- Author
-
Churcher, Andrew, primary, Ullah, Rehmat, additional, Ahmad, Jawad, additional, ur Rehman, Sadaqat, additional, Masood, Fawad, additional, Gogate, Mandar, additional, Alqahtani, Fehaid, additional, Nour, Boubakr, additional, and Buchanan, William J., additional
- Published
- 2021
- Full Text
- View/download PDF
48. Editorial: Information-Centric Network enabler communication for Internet of Things
- Author
-
Nour, Boubakr, primary, Moungla, Hassine, additional, and Rayes, Ammar, additional
- Published
- 2021
- Full Text
- View/download PDF
49. An IoT scheduling and interference mitigation scheme in TSCH using latin rectangles An IoT Scheduling and Interference Mitigation Scheme in TSCH using Latin Rectangles
- Author
-
Boucetta, Chérifa, Nour, Boubakr, Moungla, Hassine, Lahlou, Laaziz, Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174) (FEMTO-ST), Université de Technologie de Belfort-Montbeliard (UTBM)-Ecole Nationale Supérieure de Mécanique et des Microtechniques (ENSMM)-Université de Franche-Comté (UFC), Université Bourgogne Franche-Comté [COMUE] (UBFC)-Université Bourgogne Franche-Comté [COMUE] (UBFC)-Centre National de la Recherche Scientifique (CNRS), Beijing Institute of Technology (BIT), University of Paris Descartes, Laboratoire d'Informatique Paris Descartes (LIPADE - EA 2517), and Université Paris Descartes - Paris 5 (UPD5)
- Subjects
[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,[INFO]Computer Science [cs] - Abstract
International audience; Time Slotted Channel Hopping (TSCH) is one of the most used MAC mechanisms introduced by the new amendment IEEE 802.15.4e. It combines both slotted access with channel hopping technique to allow multiple communications while exploiting the 16 available channels of 2.4GHz band. The channel hopping mechanism of 802.15.4e considers an interference-free environment and does not specify how to build and manage a schedule for communication purpose. In this paper, we propose a new distributed channel hopping scheme that exploits Latin rectangles to avoid interference and collisions. In essence, the scheduling of links is performed by Latin rectangles where rows are channel offsets and columns are slot offsets. Thus, the frequency of communication is derived using Latin rectangles. Consequently, interference and multi-path fading are mitigated with more reliability and robustness. The efficiency of the proposed scheme has been validated by extensive simulation.
- Published
- 2019
50. A Distributed Cache Placement Scheme for Large-Scale Information-Centric Networking
- Author
-
Nour, Boubakr, primary, Khelifi, Hakima, additional, Moungla, Hassine, additional, Hussain, Rasheed, additional, and Guizani, Nadra, additional
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.