Book :
 
"Adaptive Security in Dynamic Group Communications: Dynamics-aware key management and data origin authentication techniques for highly dynamic and large scale multi-party communications ", num. 978-3639203745, VDM Verlag, October, 2009 ( Challal, Y. and Bouabdallah, A.)

Journal Papers

" A New Class of Hash-Chain Based Key Pre-distribution Schemes for WSN",  Computer Communications (Elsevier); Co-authors : Bechkit W., Challal Y., to appear

"An Efficient Key Management Scheme for Content Access Control for Linear Hierarchies", Computer networks (Elsevier),To appear, co-authors : H.Ragab Hassen, H. Bettahar, Y. Challal, .

"Adaptive Group Key Management Protocol for Wireless Communications”, Journal of Universal Computer Science, Vol. 18, No. 6, pp. 874-899, 2012, co-authors :S. Gharout, Y. Challal, M. Achemlal .

"Certification-based trust models in mobile ad hoc networks: A survey and taxonomy" Journal of Network and Computer Applications (Elsevier), Vol. 35, pp. 268-286, 2012, co-authors : M. Omar, Y. Challal, A.,

"A New Application-Level Multicast Technique for Stable, Robust and Efficient Overlay Tree Construction" Computer networks (Elsevier), Vol. 55, pp. 3332-3350, 2011, co-authors : M. Al-Kubeily, H. Bettahar,

"A New Worm Propagation Threat in BitTorrent : Modeling and Analysis", Telecommunication Systems Journal (Springer) , vol. 2010, num. 45, pp. 95-109, (2010) , co-authors : S. Hattahet, Y. Challal,

"The Topology Change Attack: Threat and Impact" ,  Journal of Universal Computer Science, Vol. 15, No. 2, pp. 465-487 (2009), co-authors : M.A. Abdelouahab, M. Achemlal, S. Laniepce.

" Reliable and Fully Distributed Trust Model for Mobile Ad hoc Networks" , Computer and Security Journal (Elsevier Publisher), V.28(3-4), pages:199-214. (2009) co-authors : O. Mawloud, Y. Challal,

" TKS: a transition key management scheme for secure application level multicast",  International Journal of Security and Networks, Vol.4, No.4, pp.210-222 (2009), co-authors : M. Al-Kubeily, H. Bettahar,

"On Security issues in Embedded Systems: Challenges and Solutions ", International Journal of Information and Computer Security (Inderscience editor), Vol. 2, num. 2, pp. 140-174, (2008), . co-authors : L. Khelladi, Y. Challal, N. Badache

"Scalable Delay-constrained Multicast Group Key Management", International Journal of Network Security, Vol.7, No.2, PP.153–167, ( 2008) ; co-authors : S. Gharout, Y. Challal, Bettahar

"Adaptive clustering for scalable key management in dynamic group communication ", International Journal of Network Security, Vol. 3, num. 2, pp. 133-146, (2008) , co-co-authors : S. Gharout, Y. Challal,

"Key Management for Content Access Control in a Hierarchy" Computer Networks, Elsevier, vol. 51, num. 11, pp. 3197-3219, (2007), co-authors : H.Ragab Hassen, H. Bettahar, Y. Challal,

" RLH: Receiver driven Layered Hash-chaining for multicast data origin authentication ", Computer Communications Journal (Elsevier Publisher), Volume: 28 (7), pp.726-740, (2005). co-authors : Y. Challal, Y. Hinard

"Sender and Receiver Access Control to the Multicast Delivery Tree in Mobile IP Environment: A Survey", IEEE  Communications surveys and Tutorials,   Vol. 7, No. 2, (2005), co-authors : I. Romdhani, M. Kellil, H.Y. Lach, H. Bettahar

"H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming "Computers and Security (Elsevier Science Publisher, Vol. 24, Issue 1, (2005), co-authors : Y. Challal, H. Bettahar

"Leader election in oriented Star graphs" Networks, Vol.47, (2005), co-authors :  Shi W.,  Srimani P.K.                               

" A Scalable and Fault-Tolerant Group Key Management Protocols", Journal of high speed networks,  vol. 13, no. 4, (2004), co-authors : Seba H., Badache N.

"SAKM: A Scalable and Adaptive Key Management Approach for Multicast Communications", ACM SIGCOMM Computer Communications Review , Vol. 34, Number 2, pages: 55:70, (2004).   co-authors : Y. Challal, H. Bettahar

"A Taxonomy of Multicast Data Origin Authentication: Issues and Solutions", IEEE Communications Surveys and Tutorials , Volume: 6 Number: 3, (2004). co-authors : Y. Challal, H. Bettahar

" Mobile multicast communications :Chellenges and solutions ", IEEE  Communications surveys and Tutorials , Jan. 2004. co-authors : I. Romdhani, M. Kellil, H.Y. Lach, H. Bettahar

" Mutual exclusion in Ad'hoc networks: a survey ", ACM Operating Systems  Review , Vol. 38, N° 1, (2004) pp.  74-89. co-authors : M. Benchaiba, N. Badache, M. Ahmed Nasser

" Key management and multicast security : A survey " (in french), Annals of telecommunications 58, n°. 7-8, (2003), pp. 1090-1129.  co-authors : Seba H., Badache N., Bettahar H., Tandjaoui D.

" A new approach for delay constraint routing ",  Computer Communications, Elsevier Science Publisher , vol. 25/18 pp. 1751-1764, (2002).   co-authors : Bettahar H.

"GMRP: Problème Généralisé de Routage Multipoint ", Annals of telecommunications , T. 57, No. 9/10, (2002). co-author : Bettahar H.

" A distributed Token-based  algorithm for the dynamic resource allocation problem ", ACM Operating systems Review , Vol. 34, No. 3 (2000), pp. 60-68, co-authors : Laforest C..

" Embedding complete binary Trees into Star and Pancake networks ", Theory of Computer Systems 31(1998), pp. 279-305. co-authors : Heydemann M-C, Opatrny J., Sotteau  D.

"Edge deletion preserving the diameter of the hypercube" , Discrete Applied Mathematics , 63 (1995) pp. 91-95.  co-authors :Delorme C., Djelloul S.

"On mutual exclusion in faulty distributed systems" , ACM Operating Systems  Review , Vol. 28,  N° 1, (1994) pp.  80-87.

"A fault-tolerant algorithm for the mutual exclusion in real-time distributed  systems" , Journal of computing and Information , Vol. 1 N° 1 (1994), pp. 438-454. co-authors :König J.C., Yagoubi M.

"On the edge-forwarding Index problem of small graphs" , Networks , Vol. 23 (1993), pp. 249-255. co-author : Sotteau D.

"An improvement of the Maekawa's mutual exclusion algorithm to make it Fault-tolerant" , Parallel Processing Letters , Vol. 2 n° 2&3 (1992) pp. 283-290. co-authors :König J.C.,

 

International Conferences (Since 2000)

"Secure and Scalable Cloud-based Architecture for e-Health Wireless sensor networks", ICCCN'2012, Embedded Systems, and Pervasive Computing Track (SEP); Co-authors : Lounis A. Hadjidj, A., Challal, Y.

"A New Adaptive MAC Protocol with QoS support for Heterogeneous Wireless Sensor Networks', IEEE ISCC'2012 , Co-authors : Souil, M., Rault T.,

"A New Scalable Key Pre-distribution Scheme for WSN", ICCCN'2012 Sensor networks", ICCCN'2012, Embedded Systems, and Pervasive Computing Track (SEP) ; Co-authors : Bechkit W., Challal Y.,

  " A New Weighted Shortest Path Tree for Convergecast Traffic Routing in WSN ", IEEE ISCC'2012 ; Co-authors : Bechkit W., Koudil M , Challal Y., Souici B., Benatchba K.,

"A study of Wireless Sensor Network Architectures and Projects for Traffic Light Monitoring", 3rd International Conference on Ambient Systems, Networks and Technologies August 27-29, 2012, Niagara Falls, Ontario, Canada ; Co-authors : M A Kafi, Y Challal, D Djenouri, N Badache,

'Slotted Contention-Based Energy-Efficient MAC Protocols in Delay-Sensitive Wireless Sensor Networks', IEEE ISCC'2012 ; Co-authors : Doudou S., Djenouri D, Badache N,

"Fast Restoration Of Connectivity for Wireless Sensor Networks" , International Conference on Next Generation Wired/Wireless Networking (NEW2AN), St Petersbourg, Russia, 2012; Co-authors : Maalel N., Kellil M., Roux P.,

"Impact of Pseudonym Pre-computation and Pre-distribution in Hybrid Vehicular Networks", (POSTER) ACM International Workshop on VehiculAr Inter-NETworking, Systems, and Applications (ACM VANET 2012) ; Co-authors : Benin J., Poumailloux, H. Owen

"Toward a High-Fidelity Wireless Sensor Network for Rehabilitation Supervision". 36th Annual IEEE Conference on Local Computer Networks (LCN’2011). Bonn, Germany 2011, Co-authors : Hadjidj, A., Challal,

"Rehabilitation Supervision Using Wireless Sensor Networks", IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM 2011), Lucca, Italy, Co-authors : Hadjidj, A. A., Challal, Y.

"On QoS Provisioning in Context-Aware Wireless Sensor Networks for Healthcare"  IEEE ICCCN 2011/ Workshop on Context-aware QoS Provisioning and Management for Emerging Networks, Applications and Services, Hawai, USA, 2011, Co-authors : M. Souil,

" HDMRP : An Efficient Fault-Tolerant Multipath Routing Protocol for Heterogeneous Wireless Sensor Networks", 7th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (Qshine 2010), Springer, Nov. 2010, Houston, Texas, USA, Co-authors : Hadjidj, A., Challal, Y

" Enhancing resilience of probabilistic key pre-distribution schemes for WSNs through hash chaining",17th ACM Conference on Computer and Communications Security (ACM CCS'2010), Oct. 2010, Chicago, USA, Co-authors : Bechkit W., Challal Y.,

"An Efficient and Highly Resilient Key Management Scheme for Wireless Sensor Networks", IEEE Conference on Local Computer (IEEE LCN 2010),  Oct. 2010, Denver, Colorado, USA, Co-authors : Bechkit W., Challal Y.,

. "BiTIT: Throttling BitTorrent Illegal Traffic", IEEE International Symposium on Computers and Communications (IEEE ISCC'2010), Juin 2010, Riccione, Italy, Co-authors : Sinan Hatahet, S., Challal, Y.

"Key Management With Host Mobility in Dynamic Groups", ACM International conference on Security of information and network,  (ACM SIN2010), Sept. 2010,  Taganrog, Rostov-on-Don, Russia, Co-authors : Gharout, S., Kellil, M., Challal, Y,

"A cross-Layer Reputation System for Routing Non-Cooperation Effects Mitigation Within Hybrid Ad-Hoc Networks ,   ACM International Wireless Communication &Mobile Computing Conference (IWCMC 2010), June 2010, Caen, France, Co-authors : Lanièpce S.,  Achemlal M., Lancieri L.

"Mitigating Routing Non-Cooperation Effects within hybrid Ad-Hoc Networks", International Conference on COMmunication Systems and NETworkS (COMSNETS 2009), Janv. 2009, Bangalor, India, co-authors : S. Lanièpce, M. Achemlal,

"BitTorrent Worm Sensor Network : P2P Worms Detection and Containment"   17 Euromicro International Conference on Parallel, Distributed, and network based Processing, (PDP 2009), fev. 2009, Weimar, Germany, co-authors : S. Hattahet, Y. Challal, 

"A New Worm Propagation Threat in BitTorrent Modeling and Analysis", Proceedings of the International Multiconference on Computer Science and Information Technology,  Oct 2008,  Wisla Poland, co-authors : S. Hattahet, Y. Challal,

"TCA : A Toplogy Change Attack in P2P networks", IFIP Networking, MWNS workshop, 2008, co-authors : M. Abdelouahab, H. Ragab, S. Laniepce, M. Achemlal,

"A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks", IEEE International Conference and Exebition on Next Generation Mobile  Applications and services/ Workshop on Wireless and Mobile Security  (WMS'08), Cardiff, GB, sep. 2008, co-authors : A. Babakhouya, Y. Challal,

" Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast Sessions" International Conference on Information Assurance and Security (IAS08), 8-10 September, Naples, Italy,co-authors : M. Al-Kubeily, H. Bettahar,

"TLA: A Tow Level Architecture for Key Management in Wireless SensorNetworks", 2nd International Conference on sensor Technologies and Applications, August 2008, Cap Esterel, France., co-authors : B. Maala, H. Bettahar

 HERO: Hierarchical key management protocol for heterogeneous wireless sensor networks”, IFIP-WSAN’2008, Springer Verlag Volume 264/2008, co-authors :B. Maala, Y. Challal.

" A New and Efficient Key Management Scheme for Content Access Control within Tree Hierarchies", 21st IEEE International Conference on Advanced Information Networking and Applications, Niagara Falls, Canada, may 2007, co-authors : H.Ragab Hassen, H. Bettahar,

"MDA-ALM: Membership Delay Aware Application-Level Multicast", IEEE International Global Information Infrastructure Symposium ( IEEE GIIS), July 2007, Marrakech, Morroco ; co-authors : M. Al-Kubeily, H. Bettahar

"NetTRUST:mixed NETworks Trust infrastRUcture baSed on Threshold cryptography", IEEE Securecom'07 / SECOVAL, 2007, Nice, France ; co-authors : O. Mawloud, Y. Challal

"Efficient Key Management Scheme for Secure Application Level Multicast", IEEE Symposium on Computers and Communications (IEEE ISCC'2007), July 2007, Aveiro, Portugal ; co-authors : Al-Kubeily, Bettahar

"SDV: a new approach to secure distance vector routing protocols", IEEE Securecom'06 / SECOVAL, 2006, co-authors : A Babakhouya, Y Challal, S Gharout,

"Adaptive Multicast Membership Management for Mobile Multicast Receivers”, IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2006), Montreal, Canada, June 19-21, 2006, co-authors : I. Romdhani, J. Munoz, H. Bettahar,

"Hierarchical Home Agent Architecture for Mobile IP Communications", IEEE Symposium on Computers and Communications (IEEE ISCC'2006), co-authors : I. Romdhani, J. Munoz, H. Bettahar,

"Layered multicast data origin authentication and non-repudiation over lossy networks", IEEE Symposium on Computers and Communications (IEEE ISCC'2006), co-authors : Y. Hinard, Y. Challal, H. Bettahar,

"Transparent Handover for Mobile Multicast Sources ", 5th International Conference on Networking, IEEE ICN'06, Mauritius, April 2006. co-authors : I. Romdhani, H. Bettahar,

" A novel approach in designing Multicast Content Distribution Networks, 7th IEEE International Symposium on Computer Networks (ISCN 2006), Istanbul (Turquie), juin 2006, co-authors : Y. Hinard, Y. Challal, H. Bettahar,

Mobile Multicast Route Optimisation ", IEEE International Conference on Communications ( IEEE ICC'2006), "Next Generation Mobile Networks" symposium , Istanbul, Turquie, June 2006, co-authors : I. Romdhani, J. Munoz, H. Bettahar,

" Hash-based hierarchical Key Distribution for Group Communication ", poster INFOCOM 2005, Miami, USA, March 2005. ; co-authors : Ragab H., Bettahar H., Challal, Y.

" Hi-KD: An Efficient Key Management Algorithm for Hierarchical Group", IEEE/CREATENET International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecurComm'05), Athenes, Grèce, sep. 2005, ; co-authors : Ragab H., Bettahar H., Challal,

" Authenticast: a source authentication protocol for multicast flows and streams ", International Conference on Information Security, Istanbul, June 2005. co-authors : Y. Challal

" A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks", IFIP/IEEE WONS 2005 (WirelessOn demand Network Systems and services), Switzerland, jan. 2005. Co-authors :  A. Derhab, N. Badache,

"A2cast: an Adaptive source Authentication protocol for multiCAST streams", 9th IEEE Symposium on Computers and Communications (IEEE ISCC'2004), Alexendia,  Egypt, July 2004. Co-authors : Y. Challal, H. Bettahar , 

"Hybrid and Adaptive Hash-chaining scheme for datastreaming source authentication" , 7th  IEEE International Conference on  High Speed networks and Multimedia (HSNMC04), Toulouse, July 2004, Co-authors : Y. Challal, H. Bettahar ,

"Performance Analysis of binding update in Mobile IP during Handoff" , 7th  IEEE International Conference on  High Speed networks and Multimedia (HSNMC04), Toulouse, July 2004, Co-authors : D. Tandjaoui, N. Badache ,

" A Scalable and Adaptive Key Management Protocol for Group Communication", International Conference on Wired/Wireless Internet communications (WWIC'2004), Lecture Note in Computer Science (LNCS 2957), Frankfurt (Oder), Germany, Feb. 2004, Co-authors : Y. Challal, H. Bettahar ,

"Mobility-Aware Rendezvous Point For Mobile Multicast Sources", International Conference on Wired/Wireless Internet communications (WWIC'2004), Lecture Note in Computer Science (LNCS 2957), Frankfurt (Oder), Germany, Feb. 2004,  co-authors : I. Romdhani, M. Kellil, H-Y. Lach, H. Bettahar,

"An efficient QoS Server selection protocol for duplicated  layered multicast servers", IEEE International Conference on Information & Communication Technologies, Damascus, Syria,  April 2004,  co-authors : H. Bettahar, C. Arar, 

"Increasing the robustness of  initial key agreement with failure detectors", IEEE Globecom, San Francisco, USA, Dec. 2003, co-authors : Seba H., Badache N.

"EBM: Edge-Based Multicasting in DiffServ Networks", Fifth International Workshop on  Networked Group Communications (NGC'03), Lecture Notes In Computer Sciences (Springer Verlag), Munich, Germany,  Sep. 2003,  co-authors : A. Striegel, H. Bettahar, G. Manimaran,

" Ensuring Fault-Tolerance in Group-Key Distribution using group characteristics",   Trusted Internet Workshop HiPC'2003,  Hyderabad, India, Dec. 2003. co-authors : Seba H., Badache N.

"A scalable  and adaptive key management approach for group communication" , Sécurité et Architecture Réseaux (SAR'2003), Nancy-France, July 2003, co-authors : Challal Y., Bettahar H.

"Seamless intra-domain handoff using simultaneous bindings" , ACS/IEEE International Conference  on  Computer  Systems  and  Applications,  Tunisia,  2003, co-authors :

"Performance enhancement of smooth handoff in mobile IP by reducing  packets disorder", 8th IEEE symposium on Computers and communications (ISCC), Antalya, Turquie, June 2003. Co-authors : Tandjaoui, D., Badache, N., Bettahar H., Seba H.

" AKMP :   An  adaptive key management protocol for secure multicast" , IEEE Intenational Conference on Computer Communications and Networks (ICCCN 2002), october 14-16, 2002, Miami, Florida, USA.  co-authors :  Bettahar H., Challal Y.,

" New algorithms for delay constrained multicast routing ", IEEE Networks 2002, 26-29 July 2002, Atanta (USA). co-authors : Bettahar H.

"A Fault-Tolerant Route Establishment Protocol for IP Networks ",  IEEE LANMAN 2002,  Stockholm, August 11-14, 2002. co-authors : Beaujean C., Bettahar H., Srimani P.,

" An efficient all-to-all communication protocol in honeycomb network ", International Symposium on  Performance Evaluation of Computer and Telecommunication Systems,  14 - 18 july  2002, San Diego (USA). co-authors :Myoupo, J.F., Seme D.,

" Toward a smooth handoff for TCP and real time applications in wireless networks ", International Network Conference INC 2002, Playmouth, 16-18 July 2002.  co-authors : Badache N., Bettahar H., Seba H.Tandjaoui D.

" An  hybrid approach to group key management ", International Network Conference INC 2002, Playmouth, 16-18 July 2002, co-authors : Badache N., Bettahar H., Seba H.Tandjaoui D.

" solving consensus problem in a dynamic group : an approach suitable for mobile environment", 7 h IEEE International Symposium on Computers and Communications, Italy, July 2002. co-authors : Badache N.,  Seba H.,

" Fault-Tolerant Group Communication Service for Mobile Hosts " International Conference on Communications in Computing (CIC 2002), Las Vegas, USA, 24-27 July 2002 . co-authors : Badache N.,  Seba H.

"A two levels failure detector Scheme for solving consensus in a mobile environment" , Asian International mobile computing conference, in cooperation with ACM Sigmobile, Langkawi, Malysia, may 2002. co-authors : Badache N.,  Seba H.,

" QoS routing Protocol for the generalized multicast routing problem (GMRP)" , IEEE International Conference on Networking, ICN'01 Colmar, July 2001, co-author : Bettahar H.,

" A parametrized distributed unicast routing algorithm with end-to-end delay constraint ", IEEE International Conference on Telecommunication, Bucharest, June 2001. Best Paper Award. co-author : Beaujean C., Bettahar H.,

" Leader election in wrapped butterfly networks ". ParC0'2001, International Conference on Parallel Computing, Naples, Italy,  Sep. 2001. co-authors : Tallia D., Srimani P.

" A simple resource reservation protocol for multicast communications ", 6 th IEEE symposium on Computers and communications (ISCC'01), Tunisia, July 2001. co-author : Bettahar H., Beaujean C.,Cateloin S.,

" Delay-Based routing Issue in IP networks ", Networks 2000, Toronto (Canada), sep. 2000. co-author : Bettahar H., Beaujean C., Cateloin S., Gourdin E.,

" A Simple Resource Reservation Protocol for the Internet ", IEEE International Conference on Computer Communication and Networks, Las Vegas(USA), Oct. 2000. co-author : Beaujeau C., Cateloin S.,

" Fault-tolerant Path Tree construction for multicast Routing in Mobile Networks ", EuroPar-2000, Lecture Notes in Computer Science, Munich (Germany), Sep. 2000.co-authors : Gupta S., Srimani P.,

" A scalable Multicast protocol for delay-constrained shared multicast tree construction ", 4 th IEEE symposium on Computers and communications, Egypt, July1999. co-author : Bettahar H.,

" A Framework for a New Resource Reservation Protocol for the Internet ", International Conference on Advanced Commumnications Technology, Korea, February 1999. co-author : Beaujeau C., Cateloin S.,

" Finding Euler tour in distributed networks ", PDPTA, June 1999, Las Vegas (USA).    co-authors : Hadim M.,

 

Invited speaker

Bouabdallah A., " Resources Allocation and Security in Dynamic Networks", France Telecom Workshop on Ad'Hoc Networks : Challenges and perspectives, October, 2005

Bouabdallah A., " IP multicast Security : a tutorial ",   Internet Next Generation, summer school, Strasbourg, june 2004

Bouabdallah A., " Groupe key management protocols ", Workshop on Security and Information technology (WSTI'2003), Algiers, Dec. 2003

Bouabdallah A., " IP multicast ", Journee  CNRS,  Action Spécifique Securité (in French), May 2002, Paris 

Bouabdallah A., " Delay-Constrained routing in mobile networks " ,  Journée  CNRS, Action Spécifique Mobilité  (in French), June 2002, Paris