UMR CNRS 7253

Site Tools


en:my_publi

Book / Journal Papers / International Conferences (Since 2000) / Invited speaker /

Book

“Adaptive Security in Dynamic Group Communications: Dynamics-aware key management and data origin authentication techniques for highly dynamic and large scale multi-party communications ”, num. 978-3639203745, VDM Verlag, October, 2009 ( Challal, Y. and Bouabdallah, A.)

Journal Papers

“Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things”,
IEEE Transactions on Dependable and Secure Computing, To appear ; Co-authors : Kouicem DE., Imine Y., Lakhlef H., ,

“Energy-efficiency in security of 5G-based IoT: An end-to-end adaptive approach”,
IEEE Internet of things Journal, To appear ; Co-authors : Hellaoui H., Koudil M.,

“On QoS-aware Location Privacy in Mobile Networks”,
International Journal of Information and Computer Security (Indrescience), To appear ; Co-authors : Senoussi N-E, Bachir A., ,

“An Accountable Privacy-, Preserving Scheme for Public Information Sharing systems”,
Computers and Security (Elsevier), Vol. 93, (2020) ; Co-authors : Imine Y. Lounis A.,

“A Versatile Key Management Protocol for Secure Group and Device-to-Device Communication in the Internet of Things”,
Journal of Network and Computer Applications (JNCA), Vol. 150, (2020) ; Co-authors : Kandi M.A., Lakhlef H., Challal Y.,

“Optimized in-network authentication against pollution attacks in Software-Defined Named Data Networking”,
Journal of Information Security and Applications, Vol. 50, (2020); Co-authors : Boussaha R., Challal, Y., Bessedik,

“Driver Drowsiness Measurement Technologies: Current Research, Market Solutions, and Challenges”,
International Journal of Intelligent Transportation Systems Research (Springer), 18, pp. 297–319(2020) ; Co-authors : Doudou M., Cherfaoui V.,

“Interest-based Trust Management Scheme for Social Internet of Things”,
Springer Journal of Ambient Intelligence and Humanized Computing , 11(3): 1129-1140 (2020) ; Co-authors : Talbi S.,

“A Light on Suitability of Physiological Sensors for Efficient Driver Drowsiness Detection System”,
Sensors & Transducers Journal, 224(8), pp. 39-50 (2018); Co-authors : Doudou M., Cherfaoui V.,

““Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments””,
Journal of Ambient Intelligence and Humanized Computing, Vol. 9, Issue 5, pp.1527–1539 (2018); Co-authors : Mohammedi M, Omar M.,

“Internet of Things Security: a top-down survey”,
Computer networks, 141: 199-221 (2018) Co-authors : Kouicem D-E, Lakhlef H.,

“Revocable Attribute-Based Access Control In Mutli-Autority Systems”
Journal of Network and Computer Applications (JNCA), Vol. 122, pp. 61-76, (2018); Co-authors : Imine Y. Lounis A.

“An energy efficient and QoS aware routing protocol for wireless sensor and actuator networks”,
International Journal of Electronics and Communications, Vol. 83, pp 193-203, (2018); Co-authors : Yahiaoui S., Omar M., Natalizio E., Challal Y.,

“Agent-based broadcast protocols for wireless heterogeneous node networks”,
Computer Communications , Vol. 115: 51-63 (2018) ; Co-authors : Lakhlef H., Raynal M., Bourgeois J.

“Adaptive and dual data-communication trust scheme for clustered wireless sensor networks”,
Telecommunication Systems , Vol. 65(4): 605-619 (2017) ; Co-authors : Talbi S., Koudil M., Benatchba K

“ Energy-efficient Mechanisms in Security of the Internet of Things: A survey”,
Computer Networks , Vol. 127: 173-189 (2017) ; Co-authors : Hellaoui H., Koudil M.,

“ A Trust-based Approach for Securing Data Communication in Delay Tolerant Networks”,
International Journal of Information and Computer Security , Vol. 9, Issue 4, 2017 ; Co-authors : Touazi D., Omar M., Bendib A.,

“QoS-based Routing in Wireless Body Area Networks: A Survey and Taxonomy ”,
Computing Journal , 100(3): 245-275 (2018); Co-authors : Yessad N, Omar M., Tari A.,

“ A survey of energy-efficient human context recognition systems using wearable sensors for healthcare applications”,
Pervasive and Mobile Computing Journal , Vol. 37 Issue C, pp. 23-44 (Juin 2017) ; Co-authors : Rault T., Challal Y.,

“Game Theory Framework for MAC Parameter Optimization in Energy-Delay Constrained Sensor Networks”,
ACM Transactions on Sensor Networks , Vol. 12 Issue 2, 2016 ; Co-authors : Doudou, M., Barcelo-Ordina J., Djenouri, D., Garcia Vidal, Jorge, Badache, N.,

“Lightweight Sharing Scheme for Data Integrity Protection in WSNs”,
Wireless Personal Communications , 89(1): 211-226 (2016) ; Co-authors : Bouakkaz F., Omar M., Laib S., Guermouz L., Tari A.,

“Key Pre-Distributions From Graph-Based Block Designs”,
IEEE Sensors Journal, Vol. 16, Issue: 6, pp. 1842-1850, 2016 Co-authors : Ding Jie, Tarokh V.,

“Healing on the Cloud: Secure Cloud Architecture for Medical Wireless Sensor Networks”,
Future Generation Computer Systems (Elsevier), Vol. 55, pp. 266–277, 2016 ; Co-authors : Lounis A., Hadjidj A., Challal Y.,

“Reliable and energy aware query-driven routing protocol for wireless sensor networks”,
Annals of Telecommunications, 71(1-2): 73-85 (2016) ; Co-authors : Omar M., Yahiaoui S.,

“Lightweight Identity-based Authentication Protocol for Wireless Sensor Networks”,
International Journal of Information and Computer Security, Vol. 8, No. 2, (2016) ; Co-authors : Omar M, Ouada F-S., Tari K.,

“M2M Security: Challenges and Solutions”,
IEEE Computing surveys and tutorials, Issue 99, 2016, ; Co-authors : Barki A., Gharout S., Traore J.,

“Joint Connectivity-Coverage Temperature-Aware Algorithms for Wireless Sensor Networks”,
IEEE Transaction on parallel and Distributed Systems, Vol. 26, No. 7, 2015 ; Co-authors : Bachir A., Bechkit W., Challal Y.,

“Energy-Efficiency in Wireless Sensor Networks: a top-down review approach”,
Computer Networks, Vol. 67: pp. 104-122 (2014) ; Co-authors :Rault T., Challal Y.,

“Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks”,
Computer Communications (Elsevier), Vol. 43: pp. 16-30 (2014) ; Co-authors : Souil M., Kamal E. A.,

“Synchronous Contention-Based MAC Protocols for Delay-Sensitive Wireless Sensor Networks: A Review and Taxonomy”,
Journal of Network and Computer Applications, Volume 38, pp. 172–184, (2014) ; Co-authors : Doudou S., Djenouri D, Badache N,

“A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks”,
IEEE Transactions on Wireless Communications, 12(2): 948-959 (2013); Co-authors : Bechkit W., Challal Y., Tarokh V.

“Temperature-Aware Density Optimization for Low Power Wireless Sensor Networks”,
IEEE Communications Letters, 17(2): 325-328 (2013), Co-authors :Bachir, A. and Bechkit, W. and Challal, Y.

“Wireless Sensor Networks for Rehabilitation Applications : Challenges and Opportunities”,
Journal of Network and Computer Applications vol. 36, pp. 1-15, 2013, Co-authors :Hadjidj A., Souil, M., Challal Y., Owen H.,

” A New Class of Hash-Chain Based Key Pre-distribution Schemes for WSN“,
Computer Communications (Elsevier); 36(3): 243-255 (2013) Co-authors : Bechkit W., Challal Y.,

“An Efficient Key Management Scheme for Content Access Control for Linear Hierarchies”,
Computer networks (Elsevier), 56(8): 2107-2118, 2012, co-authors : H.Ragab Hassen, H. Bettahar, Y. Challal, .

“Adaptive Group Key Management Protocol for Wireless Communications”,
Journal of Universal Computer Science, Vol. 18, No. 6, pp. 874-899, 2012, co-authors :S. Gharout, Y. Challal, M. Achemlal .

“Certification-based trust models in mobile ad hoc networks: A survey and taxonomy”
Journal of Network and Computer Applications (Elsevier), Vol. 35, pp. 268-286, 2012, co-authors : M. Omar, Y. Challal, A.,

“A New Application-Level Multicast Technique for Stable, Robust and Efficient Overlay Tree Construction”
Computer networks (Elsevier), Vol. 55, pp. 3332-3350, 2011, co-authors : M. Al-Kubeily, H. Bettahar,

“A New Worm Propagation Threat in BitTorrent : Modeling and Analysis”,
Telecommunication Systems Journal (Springer) , vol. 2010, num. 45, pp. 95-109, (2010) , co-authors : S. Hattahet, Y. Challal,

“The Topology Change Attack: Threat and Impact” ,
Journal of Universal Computer Science, Vol. 15, No. 2, pp. 465-487 (2009), co-authors : M.A. Abdelouahab, M. Achemlal, S. Laniepce.

” Reliable and Fully Distributed Trust Model for Mobile Ad hoc Networks“,
Computer and Security Journal (Elsevier Publisher), V.28(3-4), pages:199-214. (2009) co-authors : O. Mawloud, Y. Challal,

” TKS: a transition key management scheme for secure application level multicast“,
International Journal of Security and Networks, Vol.4, No.4, pp.210-222 (2009), co-authors : M. Al-Kubeily, H. Bettahar,

“On Security issues in Embedded Systems: Challenges and Solutions ”, International
Journal of Information and Computer Security (Inderscience editor), Vol. 2, num. 2, pp. 140-174, (2008), . co-authors : L. Khelladi, Y. Challal, N. Badache

“Scalable Delay-constrained Multicast Group Key Management”,
International Journal of Network Security, Vol.7, No.2, PP.153–167, ( 2008) ; co-authors : S. Gharout, Y. Challal, Bettahar

“Adaptive clustering for scalable key management in dynamic group communication ”,
International Journal of Network Security, Vol. 3, num. 2, pp. 133-146, (2008) , co-co-authors : S. Gharout, Y. Challal,

“Key Management for Content Access Control in a Hierarchy”
Computer Networks, Elsevier, vol. 51, num. 11, pp. 3197-3219, (2007), co-authors : H.Ragab Hassen, H. Bettahar, Y. Challal,

” RLH: Receiver driven Layered Hash-chaining for multicast data origin authentication “,
Computer Communications Journal (Elsevier Publisher), Volume: 28 (7), pp.726-740, (2005). co-authors : Y. Challal, Y. Hinard

“Sender and Receiver Access Control to the Multicast Delivery Tree in Mobile IP Environment: A Survey”,
IEEE Communications surveys and Tutorials, Vol. 7, No. 2, (2005), co-authors : I. Romdhani, M. Kellil, H.Y. Lach, H. Bettahar

“H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming ”,
Computers and Security (Elsevier Science Publisher, Vol. 24, Issue 1, (2005), co-authors : Y. Challal, H. Bettahar

“Leader election in oriented Star graphs”
Networks, Vol.47, (2005), co-authors : Shi W., Srimani P.K.

” A Scalable and Fault-Tolerant Group Key Management Protocols“,
Journal of high speed networks, vol. 13, no. 4, (2004), co-authors : Seba H., Badache N.

“SAKM: A Scalable and Adaptive Key Management Approach for Multicast Communications”,
ACM SIGCOMM Computer Communications Review , Vol. 34, Number 2, pages: 55:70, (2004). co-authors : Y. Challal, H. Bettahar

“A Taxonomy of Multicast Data Origin Authentication: Issues and Solutions”,
IEEE Communications Surveys and Tutorials , Volume: 6 Number: 3, (2004). co-authors : Y. Challal, H. Bettahar

” Mobile multicast communications :Chellenges and solutions “,
IEEE Communications surveys and Tutorials , Jan. 2004. co-authors : I. Romdhani, M. Kellil, H.Y. Lach, H. Bettahar

” Mutual exclusion in Ad'hoc networks: a survey “,
ACM Operating Systems Review , Vol. 38, N° 1, (2004) pp. 74-89. co-authors : M. Benchaiba, N. Badache, M. Ahmed Nasser

” Key management and multicast security : A survey “ (in french),
Annals of telecommunications 58, n°. 7-8, (2003), pp. 1090-1129. co-authors : Seba H., Badache N., Bettahar H., Tandjaoui D.

” A new approach for delay constraint routing “,
Computer Communications, Elsevier Science Publisher , vol. 25/18 pp. 1751-1764, (2002). co-authors : Bettahar H.

“GMRP: Problème Généralisé de Routage Multipoint ”,
Annals of telecommunications , T. 57, No. 9/10, (2002). co-author : Bettahar H.

” A distributed Token-based algorithm for the dynamic resource allocation problem “,
ACM Operating systems Review , Vol. 34, No. 3 (2000), pp. 60-68, co-authors : Laforest C..

” Embedding complete binary Trees into Star and Pancake networks “,
Theory of Computer Systems 31(1998), pp. 279-305. co-authors : Heydemann M-C, Opatrny J., Sotteau D.

“Edge deletion preserving the diameter of the hypercube” ,
Discrete Applied Mathematics , 63 (1995) pp. 91-95. co-authors :Delorme C., Djelloul S.

“On mutual exclusion in faulty distributed systems” ,
ACM Operating Systems Review , Vol. 28, N° 1, (1994) pp. 80-87.

“A fault-tolerant algorithm for the mutual exclusion in real-time distributed systems” ,
Journal of computing and Information , Vol. 1 N° 1 (1994), pp. 438-454. co-authors :König J.C., Yagoubi M.

“On the edge-forwarding Index problem of small graphs” ,
Networks , Vol. 23 (1993), pp. 249-255. co-author : Sotteau D.

“An improvement of the Maekawa's mutual exclusion algorithm to make it Fault-tolerant” ,
Parallel Processing Letters , Vol. 2 n° 2&3 (1992) pp. 283-290. co-authors :König J.C.,

International Conferences (Since 2000)

“Towards Energy Efficient Mobile Data Collection in Cluster-based IoT Networks”,
IEEE International Conference on Pervasive Computing and Communications (Percom work in progress), Kassel, Germany, 2021 ; co_authors :Benhamaid S., Lakhlef H.,

“Autonomous Vehicle Security: Literature Review of Real Attack Experiments”,
15th International Conference on Risks and Security of Internet and Systems (CRISIS'2020), paris, France, 2020 ; co_authors :Bouchelaghem S., Omar M.,

“An Energy Efficient Architecture of self-sustainable WSN based on Energy Harvesting and Wireless Charging with consideration of deployment cost”,
ACM Q2SWinet, Alicante, Spain, 2020 ; co_authors :Abid K, Jaber G., Lakhlef H., Lounis A.,

“A Memory-efficient Group Key Managment for Communicating Things”,
ACM Q2SWinet, Alicante, Spain, 2020 ; co_authors :Lakhlef H., D'Andreagiovanni F.,

“An Efficient and Anonymous Blockchain-Based Data Sharing Scheme for Vehicular Networks”,
25th IEEE Symposium on Computers and Communications (IEEE ISCC), Rennes-France, 2020 ; co_authors :Kouicem D-E, Lakhlef H.,

“An Efficient and Adaptive Configuration of IEEE 802.15.4 MAC for Communication Delay Optimisation”,
11th International Conference on Network of the Future (NoF), Bordeau-France, 2020 ; co_authors :Aboubakar M., Roux P., Kellil M.,

“Distributed Time Slots Assignment Protocol in Dynamic Networks”,
25th IEEE Symposium on Computers and Communications (IEEE ISCC), Rennes-France, 2020 ; co_authors :Lakhlef H., Jaber G., Bouabdallah A., D'Andreagiovanni F., Lounis A.,

“Using Machine Learning to Estimate the Optimal Transmission Range for RPL Networks”,
IEEE/IFIP Network Operations and Management Symposium (Poster), (IEEE/IFIP NOMS'2020), Budapest, Hungaria, 2020 ; co_authors :Aboubakar M., Kellil M., Roux P.,

“A Distributed Collision-free Distance-2 Coloring Algorithm for Ring Networks”,
27th Inter. Conference on Software, Telecommunications and Computer Networks (SoftCOM 2019), Croatia, 2019 ; co_authors :Lakhlef H., Imine Y.,

“A Key Management Protocol for Secure Device-to-Device Communication in the Internet of Things”,
19th IEEE Global Communications Conference (IEEE GLOBECOM), USA, 2019 ; co_authors :Kandi M-A., Lakhlef H., Challal Y.,

“An Efficient Accountable Privacy-Preserving Scheme for Public Information Sharing in Fog Computing”,
19th IEEE Global Communications Conference (IEEE GLOBECOM), USA, 2019 ; co_authors :Imine Y, Lounis A.,

“Toward Intelligent Reconfiguration of RPL Networks using Supervised Learning”,
Wireless Days, Manchester, UK, 2019; co_authors :Aboubakar M, Kellil M., Roux P.,

“An Efficient Multi-Group Key Management Protocol for Heterogeneous Communicating Things”,
IEEE Wireless Communications and Networking Conference (IEEE WCNC), Marrakech 2019 ; co_authors :Kandi M-A., Lakhlef H., Challal Y.,

“An Efficient Architecture for Trust Management in IoE Based Systems of Systems”,
IEEE SoSE 13th System of Systems Engineering Conference, Paris, 2018 ; co_authors :Kouicem D-E, Lakhlef H.,

“MASFOG: An Efficient Mutual Authentication Scheme For Fog Computing Architecture”
17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom), New-York, 2018 ; co_authors :Imine Y., Kouicem D-E, Lounis A.,

“An Efficient Multi-Group Key Management Protocol for Internet of Things”,
26th IEEE International Conference on Software, Telecommunications and Computer Networks (IEEE SoftCO), 2018 ; co_authors : Kandi M-A., Lakhlef H., Challah Y.,

“Authenticated Network Coding for Software-Defined Named Data Networking”,
32-nd IEEE International Conference on Advanced Information Networking and Applications (AINA-2018), Kracow, Pologne, 2018 ; co_authors : Boussaha R., Challah Y.,

“Automatic removal of ocular artifacts in EEG signals for driver's drowsiness detection: A survey”,
7th IEEE International Conf. on Smart Communications in Network Technologies, (IEEE SACONET'18) El-Oued, Algeria, 2018; co_authors : Mohammedi M, Omar M.,

“Performance Specifications of Market Physiological Sensors for Efficient Driver Drowsiness Detection System”,
International Conference on Sensor networks (SENSORNETS '18), Funchal, Madeira, Portugal, 2018 ; co_authors :Doudou S.,

“Distributed Fine-Grained Secure Control of Smart Actuators in Internet of Things”,
15th IEEE International Symposium on Parallel and Distributed Processing with Applications (IEEE ISPA 2017), Guangzhou, Chine, 2017, co_authors : KouiceM D-E, Lakhlef H.,

“Immediate attribute revocation in decentralized attribute-based encryption access control”,
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17), Sydney, Australie, 2017 co_authors : Imine Y. Lounis A.,

“Secure and lightweight biometric-based remote patient authentication scheme for home healthcare systems”,
International Conference on Cloud Computing Technologies and Applications, Rabat, Maroc, 2017 ; co_authors : Mohammedi M., Omar M., Aitabdelmalek W., Mansouri A,

“Towards Authenticated Network Coding for Named Data Networking”,
25th International Conference on Software, Telecommunications and Computer Networks, , Split, Croatie, Sept. 2017 ; co_authors :Boussaha R., Challal Y., Bessedik M.,

“ABR: A new efficient attribute based revocation on access control system”,
13th International Wireless Communications and Mobile Computing Conference (IWCMC 2017), Valencia, Espagne, June 2017 ; co_authors :Imine Y. Lounis A.,

, “Providing Collision-Free and Conflict-Free Communication in General Synchronous Broadcast/Receive Networks”
IEEE International Conference on Advanced Information Networking and Applications (AINA'17), Taiwan, 2017 ; co_authors :Lakhlef H., Raynal M., Taïani F,

“EREAT: Efficient Route Estimation based-on Actuator Tracking for WSANs”
ACM BDAW '16: Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, Bulgaria, 2016 ; Co_authors :Boudrioua A., Yahiaoui S., Omar M.,

“TASIoT: Trust-based Adaptive Security in the IoT”,
IEEE LCN'2016 Dubai ; Co_authors : Hellaoui H., Koudil M.,

“Efficient QoS-aware Heterogeneous Architecture for Energy-Delay Constrained Wearable Sensor Networks”
IEEE WMNC'2016, Colmar ; Co_authors : Doudou S., Rault T.,

“Scalable multi-group key management for Advanced Metering Infrastructure”,
15th IEEE International Conference on Computer and Information Technology (CIT-2015) Liverpool, UK, Oct 2015 ; Co_authors : Benmalek M., Challal Y.,

“Adaptive Data-Communication Trust Mechanism for Clustered Wireless Sensor Networks”,
IEEE Globecom'2015 (Communications and Information System Security), San Diego, Dec 2015 ; Co_authors : Talbi S., Koudil M., Benatchba K.,

” ETTAF: Efficient Target Tracking and Filming with a Flying Ad Hoc Network“,
Proceedings of the International Workshop on Experiences with the Design and Implementation of Smart Objects, Paris, 2015 ; Co_authors : Zaouche L., Natalizio E.

“Trusted Execution Environment: What It Is, and What It Is Not”
14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Finland, 20-22 Aout, 2015 Co_authors :Sabt M, Achemlal M,

“The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation”,
30th International Information Security and Privacy Conference, Hamburg, Germany, 2015. IFIP SEC 2015, co_authors : Sabt M, Achemlal M,

“Temperature MAC Plug-in for Large Scale WSN”,
Ad-hoc and Sensor Networking Symposium (AHSN), IEEE ICC 2015 ; co-authors : Bechkit W., Malik B., challal Y.,

“Energy-efficient architecture for wearable sensor networks”,
Wireless days, Rio De Janeiro, Brasil, 2014, co-authors : Rault T, Challal Y., Marin F.,

“Context-aware energy-efficient wireless sensor architecture for body activity recognition”,
PerCom Workshops 2014, Co-authors : Rault T., Challal Y., Marin F.,

“C-CP-ABE: Cooperative Ciphertext Policy Attribute-Based Encryption for the Internet of Things”
International Conference on Advanced Networking, Distributed Systems and Applications (INDS'14), Bejaia, Algeria, 2014 ; co-authors : Touati L., Challal Y.,

“Multi-Actuators based Anycast Routing Protocol for Wireless Sensor and Actuator Networks”,
International Conference on Advanced Networking, Distributed Systems and Applications (INDS'14), Bejaia, Algérie, 2014 ; co-authors : Yahiaoui S., Omar M., Challal Y.,

“Multi-hop wireless charging optimization in Low-Power Networks”,
IEEE Globecom'13, Atlanta, co-authors : T. Rault, Y. Challal

” WSN Lifetime Optimization through Controlled Sink Mobility and Packet Buffering”,
IEEE GIIS'13, Trento, Italy, co-authors : T. Rault, Y. Challal

“Braided Disjoint Branch Routing Protocol For WSNs”,
International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2013), Compiègne, Oct. 2013, co-authors : A. Attir, A. Hadjidj, Y. Challal

“Sensor networks for emergency management”,
International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2013), Compiègne, Oct. 2013, co-authors : A. Lounis, A. Hadjidj, Y. Challal

“A Systemic Approach for IoT Security”,
DCOSS'13, Boston, co-authors : A. Riahi , Y. Challal, E. Natalizio, Z. Chtourou

“ Adaptive reliable routing protocol for WSNs”,
ICWMC'13, Nice, France, 2013, Best paper Awards, co-authors : N. Maalel , P. Roux , M. Kellil,

“Reliability for Emergency Applications in Internet of Things”,
IOT Worshop In Conjunction with DCOSS'13, Boston; co-authors : N. Maalel , P. Roux , M. Kellil,

“A Study of Wireless Sensor Networks for Urban Traffic Monitoring: Applications and Architectures”,
International Conference on Ambient Systems, Networks and Technologies, Halifax, Canada, June 2013 (ANT/SEIT 2013) ; co-authors : M.A. Kafi , Y. Challal , D. Djenouri , M. Doudou , N. Badache

“Secure and Scalable Cloud-based Architecture for e-Health Wireless sensor networks”,
IEEE ICCCN'2012, Embedded Systems, and Pervasive Computing Track (SEP); Co-authors : A.Lounis, A.Hadjidj, Y. Challal,

“A New Adaptive MAC Protocol with QoS support for Heterogeneous Wireless Sensor Networks',
IEEE ISCC'2012 , Co-authors : Souil, M., Rault T.,

“A New Scalable Key Pre-distribution Scheme for WSN”,
IEEE ICCCN'2012 Sensor networks, Embedded Systems, and Pervasive Computing Track (SEP) ; Co-authors : Bechkit W., Challal Y.,

” A New Weighted Shortest Path Tree for Convergecast Traffic Routing in WSN “,
IEEE ISCC'2012 ; Co-authors : Bechkit W., Koudil M , Challal Y., Souici B., Benatchba K.,

“A study of Wireless Sensor Network Architectures and Projects for Traffic Light Monitoring”,
3rd International Conference on Ambient Systems, Networks and Technologies August 27-29, 2012, Niagara Falls, Ontario, Canada ; Co-authors : M A Kafi, Y Challal, D Djenouri, N Badache,

'Slotted Contention-Based Energy-Efficient MAC Protocols in Delay-Sensitive Wireless Sensor Networks',
IEEE ISCC'2012 ; Co-authors : Doudou S., Djenouri D, Badache N,

“Fast Restoration Of Connectivity for Wireless Sensor Networks” ,
International Conference on Next Generation Wired/Wireless Networking (NEW2AN), St Petersbourg, Russia, 2012; Co-authors : Maalel N., Kellil M., Roux P.,

“Impact of Pseudonym Pre-computation and Pre-distribution in Hybrid Vehicular Networks”, (Poster)
ACM International Workshop on VehiculAr Inter-NETworking, Systems, and Applications (ACM VANET 2012) ; Co-authors : Benin J., Poumailloux, H. Owen

“Toward a High-Fidelity Wireless Sensor Network for Rehabilitation Supervision”.
36th Annual IEEE Conference on Local Computer Networks (LCN’2011). Bonn, Germany 2011, Co-authors : Hadjidj, A., Challal,

“Rehabilitation Supervision Using Wireless Sensor Networks”,
IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM 2011), Lucca, Italy, Co-authors : Hadjidj, A. A., Challal, Y.

“On QoS Provisioning in Context-Aware Wireless Sensor Networks for Healthcare”
IEEE ICCCN 2011/ Workshop on Context-aware QoS Provisioning and Management for Emerging Networks, Applications and Services, Hawai, USA, 2011, Co-authors : M. Souil,

” HDMRP : An Efficient Fault-Tolerant Multipath Routing Protocol for Heterogeneous Wireless Sensor Networks“,
7th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (Qshine 2010), Springer, Nov. 2010, Houston, Texas, USA, Co-authors : Hadjidj, A., Challal, Y

” Enhancing resilience of probabilistic key pre-distribution schemes for WSNs through hash chaining“,
17th ACM Conference on Computer and Communications Security (ACM CCS'2010), Oct. 2010, Chicago, USA, Co-authors : Bechkit W., Challal Y.,

“An Efficient and Highly Resilient Key Management Scheme for Wireless Sensor Networks”,
IEEE Conference on Local Computer (IEEE LCN 2010), Oct. 2010, Denver, Colorado, USA, Co-authors : Bechkit W., Challal Y.,

. “BiTIT: Throttling BitTorrent Illegal Traffic”,
IEEE International Symposium on Computers and Communications (IEEE ISCC'2010), Juin 2010, Riccione, Italy, Co-authors : Sinan Hatahet, S., Challal, Y.

“Key Management With Host Mobility in Dynamic Groups”,
ACM International conference on Security of information and network, (ACM SIN2010), Sept. 2010, Taganrog, Rostov-on-Don, Russia, Co-authors : Gharout, S., Kellil, M., Challal, Y,

“A cross-Layer Reputation System for Routing Non-Cooperation Effects Mitigation Within Hybrid Ad-Hoc Networks” ,
ACM International Wireless Communication &Mobile Computing Conference (IWCMC 2010), June 2010, Caen, France, Co-authors : Lanièpce S., Achemlal M., Lancieri L.

“Mitigating Routing Non-Cooperation Effects within hybrid Ad-Hoc Networks”,
International Conference on COMmunication Systems and NETworkS (COMSNETS 2009), Janv. 2009, Bangalor, India, co-authors : S. Lanièpce, M. Achemlal,

“BitTorrent Worm Sensor Network : P2P Worms Detection and Containment”
17 Euromicro International Conference on Parallel, Distributed, and network based Processing, (PDP 2009), fev. 2009, Weimar, Germany, co-authors : S. Hattahet, Y. Challal,

“A New Worm Propagation Threat in BitTorrent Modeling and Analysis”,
International Multiconference on Computer Science and Information Technology, Oct 2008, Wisla Poland, co-authors : S. Hattahet, Y. Challal,

“TCA : A Toplogy Change Attack in P2P networks”,
IFIP Networking, MWNS workshop, 2008, co-authors : M. Abdelouahab, H. Ragab, S. Laniepce, M. Achemlal,

“A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks”,
IEEE International Conference and Exebition on Next Generation Mobile Applications and services/ Workshop on Wireless and Mobile Security (WMS'08), Cardiff, GB, sep. 2008, co-authors : A. Babakhouya, Y. Challal,

” Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast Sessions“
International Conference on Information Assurance and Security (IAS08), 8-10 September, Naples, Italy,co-authors : M. Al-Kubeily, H. Bettahar,

“TLA: A Tow Level Architecture for Key Management in Wireless SensorNetworks”,
2nd International Conference on sensor Technologies and Applications, August 2008, Cap Esterel, France., co-authors : B. Maala, H. Bettahar

“HERO: Hierarchical key management protocol for heterogeneous wireless sensor networks”,
IFIP-WSAN’2008, Springer Verlag Volume 264/2008, co-authors :B. Maala, Y. Challal.

” A New and Efficient Key Management Scheme for Content Access Control within Tree Hierarchies“,
21st IEEE International Conference on Advanced Information Networking and Applications, Niagara Falls, Canada, may 2007, co-authors : H.Ragab Hassen, H. Bettahar,

“MDA-ALM: Membership Delay Aware Application-Level Multicast”,
IEEE International Global Information Infrastructure Symposium ( IEEE GIIS), July 2007, Marrakech, Morroco ; co-authors : M. Al-Kubeily, H. Bettahar,

“NetTRUST:mixed NETworks Trust infrastRUcture baSed on Threshold cryptography”,
IEEE Securecom'07(SECOVAL), 2007, Nice, France ; co-authors : O. Mawloud, Y. Challal

“Efficient Key Management Scheme for Secure Application Level Multicast”,
IEEE Symposium on Computers and Communications (IEEE ISCC'2007), July 2007, Aveiro, Portugal ; co-authors : Al-Kubeily, Bettahar

“SDV: a new approach to secure distance vector routing protocols”,
IEEE Securecom'06 (SECOVAL), 2006, co-authors : A Babakhouya, Y Challal, S Gharout,

“Adaptive Multicast Membership Management for Mobile Multicast Receivers”,
IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2006), Montreal, Canada, June 19-21, 2006, co-authors : I. Romdhani, J. Munoz, H. Bettahar,

“Hierarchical Home Agent Architecture for Mobile IP Communications”,
IEEE Symposium on Computers and Communications (IEEE ISCC'2006), co-authors : I. Romdhani, J. Munoz, H. Bettahar,

“Layered multicast data origin authentication and non-repudiation over lossy networks”,
IEEE Symposium on Computers and Communications (IEEE ISCC'2006), co-authors : Y. Hinard, Y. Challal, H. Bettahar,

“Transparent Handover for Mobile Multicast Sources ”,
5th International Conference on Networking, IEEE ICN'06, Mauritius, April 2006. co-authors : I. Romdhani, H. Bettahar,

” A novel approach in designing Multicast Content Distribution Networks”,
7th IEEE International Symposium on Computer Networks (ISCN 2006), Istanbul (Turquie), june 2006, co-authors : Y. Hinard, Y. Challal, H. Bettahar,

“Mobile Multicast Route Optimisation “,
IEEE International Conference on Communications ( IEEE ICC'2006), “Next Generation Mobile Networks” symposium , Istanbul, Turquie, June 2006, co-authors : I. Romdhani, J. Munoz, H. Bettahar,

” Hash-based hierarchical Key Distribution for Group Communication “,
INFOCOM 2005 (poster), Miami, USA, March 2005. ; co-authors : Ragab H., Bettahar H., Challal, Y.

” Hi-KD: An Efficient Key Management Algorithm for Hierarchical Group“,
IEEE/CREATENET International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecurComm'05), Athenes, Grèce, sep. 2005, ; co-authors : Ragab H., Bettahar H., Challal,

” Authenticast: a source authentication protocol for multicast flows and streams “,
International Conference on Information Security, Istanbul, June 2005. co-authors : Y. Challal

” A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks“,
IFIP/IEEE WONS 2005 (WirelessOn demand Network Systems and services), Switzerland, jan. 2005. Co-authors : A. Derhab, N. Badache,

“A2cast: an Adaptive source Authentication protocol for multiCAST streams”,
9th IEEE Symposium on Computers and Communications (IEEE ISCC'2004), Alexendia, Egypt, July 2004. Co-authors : Y. Challal, H. Bettahar ,

“Hybrid and Adaptive Hash-chaining scheme for datastreaming source authentication” ,
7th IEEE International Conference on High Speed networks and Multimedia (HSNMC04), Toulouse, July 2004, Co-authors : Y. Challal, H. Bettahar ,

“Performance Analysis of binding update in Mobile IP during Handoff” ,
7th IEEE International Conference on High Speed networks and Multimedia (HSNMC04), Toulouse, July 2004, Co-authors : D. Tandjaoui, N. Badache ,

” A Scalable and Adaptive Key Management Protocol for Group Communication“,
International Conference on Wired/Wireless Internet communications (WWIC'2004), Lecture Note in Computer Science (LNCS 2957), Frankfurt (Oder), Germany, Feb. 2004, Co-authors : Y. Challal, H. Bettahar ,

“Mobility-Aware Rendezvous Point For Mobile Multicast Sources”,
International Conference on Wired/Wireless Internet communications (WWIC'2004), Lecture Note in Computer Science (LNCS 2957), Frankfurt (Oder), Germany, Feb. 2004, co-authors : I. Romdhani, M. Kellil, H-Y. Lach, H. Bettahar,

“An efficient QoS Server selection protocol for duplicated layered multicast servers”,
IEEE International Conference on Information & Communication Technologies, Damascus, Syria, April 2004, co-authors : H. Bettahar, C. Arar,

“Increasing the robustness of initial key agreement with failure detectors”,
IEEE Globecom, San Francisco, USA, Dec. 2003, co-authors : Seba H., Badache N.

“EBM: Edge-Based Multicasting in DiffServ Networks”,
Fifth International Workshop on Networked Group Communications (NGC'03), Lecture Notes In Computer Sciences (Springer Verlag), Munich, Germany, Sep. 2003, co-authors : A. Striegel, H. Bettahar, G. Manimaran,

” Ensuring Fault-Tolerance in Group-Key Distribution using group characteristics“,
Trusted Internet Workshop HiPC'2003, Hyderabad, India, Dec. 2003. co-authors : Seba H., Badache N.

“A scalable and adaptive key management approach for group communication” ,
Sécurité et Architecture Réseaux (SAR'2003), Nancy-France, July 2003, co-authors : Challal Y., Bettahar H.

“Seamless intra-domain handoff using simultaneous bindings” ,
ACS/IEEE International Conference on Computer Systems and Applications, Tunisia, 2003, co-authors :

“Performance enhancement of smooth handoff in mobile IP by reducing packets disorder”,
8th IEEE symposium on Computers and communications (ISCC), Antalya, Turquie, June 2003. Co-authors : Tandjaoui, D., Badache, N., Bettahar H., Seba H.

” AKMP : An adaptive key management protocol for secure multicast“ ,
IEEE Intenational Conference on Computer Communications and Networks (ICCCN 2002), october 14-16, 2002, Miami, Florida, USA. co-authors : Bettahar H., Challal Y.,

” New algorithms for delay constrained multicast routing “,
IEEE Networks 2002, 26-29 July 2002, Atanta (USA). co-authors : Bettahar H.

“A Fault-Tolerant Route Establishment Protocol for IP Networks ”,
IEEE LANMAN 2002, Stockholm, August 11-14, 2002. co-authors : Beaujean C., Bettahar H., Srimani P.,

” An efficient all-to-all communication protocol in honeycomb network “,
International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 14 - 18 july 2002, San Diego (USA). co-authors :Myoupo, J.F., Seme D.,

” Toward a smooth handoff for TCP and real time applications in wireless networks “,
International Network Conference INC 2002, Playmouth, 16-18 July 2002. co-authors : Badache N., Bettahar H., Seba H.Tandjaoui D.

” An hybrid approach to group key management “,
International Network Conference INC 2002, Playmouth, 16-18 July 2002, co-authors : Badache N., Bettahar H., Seba H.Tandjaoui D.

” solving consensus problem in a dynamic group : an approach suitable for mobile environment“,
7 h IEEE International Symposium on Computers and Communications, Italy, July 2002. co-authors : Badache N., Seba H.,

” Fault-Tolerant Group Communication Service for Mobile Hosts “
International Conference on Communications in Computing (CIC 2002), Las Vegas, USA, 24-27 July 2002 . co-authors : Badache N., Seba H.

“A two levels failure detector Scheme for solving consensus in a mobile environment” ,
Asian International mobile computing conference, in cooperation with ACM Sigmobile, Langkawi, Malysia, may 2002. co-authors : Badache N., Seba H.,

” QoS routing Protocol for the generalized multicast routing problem (GMRP)“ ,
IEEE International Conference on Networking, ICN'01 Colmar, July 2001, co-author : Bettahar H.,

” A parametrized distributed unicast routing algorithm with end-to-end delay constraint “,
IEEE International Conference on Telecommunication, Bucharest, June 2001. Best Paper Award. co-author : Beaujean C., Bettahar H.,

” Leader election in wrapped butterfly networks “.
ParC0'2001, International Conference on Parallel Computing, Naples, Italy, Sep. 2001. co-authors : Tallia D., Srimani P.

” A simple resource reservation protocol for multicast communications “,
6 th IEEE symposium on Computers and communications (ISCC'01), Tunisia, July 2001. co-author : Bettahar H., Beaujean C.,Cateloin S.,

” Delay-Based routing Issue in IP networks “,
Networks 2000, Toronto (Canada), sep. 2000. co-author : Bettahar H., Beaujean C., Cateloin S., Gourdin E.,

“A Simple Resource Reservation Protocol for the Internet”,
IEEE International Conference on Computer Communication and Networks, Las Vegas(USA), Oct. 2000. co-author : Beaujeau C., Cateloin S.,

” Fault-tolerant Path Tree construction for multicast Routing in Mobile Networks “,
EuroPar-2000, Lecture Notes in Computer Science, Munich (Germany), Sep. 2000.co-authors : Gupta S., Srimani P.,

” A scalable Multicast protocol for delay-constrained shared multicast tree construction “,
4 th IEEE symposium on Computers and communications, Egypt, July1999. co-author : Bettahar H.,

” A Framework for a New Resource Reservation Protocol for the Internet “,
International Conference on Advanced Commumnications Technology, Korea, February 1999. co-author : Beaujeau C., Cateloin S.,

” Finding Euler tour in distributed networks “,
PDPTA, June 1999, Las Vegas (USA). co-authors : Hadim M.,


User Tools