Search Results - "Bouabdallah, Abdelmadjid"
-
1
Energy efficiency in wireless sensor networks: A top-down survey
Published in Computer networks (Amsterdam, Netherlands : 1999) (04-07-2014)“…The design of sustainable wireless sensor networks (WSNs) is a very challenging issue. On the one hand, energy-constrained sensors are expected to run…”
Get full text
Journal Article -
2
A versatile Key Management protocol for secure Group and Device-to-Device Communication in the Internet of Things
Published in Journal of network and computer applications (15-01-2020)“…The Internet of Things (IoT) is a network made up of a large number of devices that collaborate to provide various service for the benefit of society. Two…”
Get full text
Journal Article -
3
Reliable and fully distributed trust model for mobile ad hoc networks
Published in Computers & security (01-05-2009)“…A mobile ad hoc network (MANET) is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management…”
Get full text
Journal Article -
4
Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks
Published in 2012 21st International Conference on Computer Communications and Networks (ICCCN) (01-07-2012)“…There has been a host of research works on wireless sensor networks for medical applications. However, the major shortcoming of these efforts is a lack of…”
Get full text
Conference Proceeding -
5
Internet of things security: A top-down survey
Published in Computer networks (Amsterdam, Netherlands : 1999) (04-08-2018)“…Internet of Things (IoT) is one of the promising technologies that has attracted a lot of attention in both industrial and academic fields these years. It aims…”
Get full text
Journal Article -
6
Adaptive Group Key Management Protocol for Wireless Communications
Published in Journal of Universal Computer Science (2012)“…Group-oriented services and wireless communication networks are among the emerging technologies of the last few years. Group key management, which is an…”
Get full text
Journal Article -
7
Recent advances in energy management for Green-IoT: An up-to-date and comprehensive survey
Published in Journal of network and computer applications (01-02-2022)“…Internet-of-Things (IoT) refers to the massive network interconnection of objects often equipped with ubiquitous intelligence employed to provide smart…”
Get full text
Journal Article -
8
Decentralized Blockchain-Based Trust Management Protocol for the Internet of Things
Published in IEEE transactions on dependable and secure computing (01-03-2022)“…The Internet of Things (IoT) is a network that integrates a variety of heterogeneous nodes, such as connected devices (sensors, robots, and smart phones ...),…”
Get full text
Journal Article -
9
C-CP-ABE: Cooperative Ciphertext Policy Attribute-Based Encryption for the Internet of Things
Published in 2014 International Conference on Advanced Networking Distributed Systems and Applications (01-06-2014)“…Cipher text Policy Attribute-Based Encryption (CP-ABE) is an extremely powerful asymmetric encryption mechanism, but its complexity and its overhead cannot be…”
Get full text
Conference Proceeding -
10
Interest-based trust management scheme for social internet of things
Published in Journal of ambient intelligence and humanized computing (01-03-2020)“…The integration of social ties between IoT’s devices has facilitated the emergence of new paradigm named the Social Internet of Things SIoT. In this paradigm,…”
Get full text
Journal Article -
11
A taxonomy of multicast data origin authentication: Issues and solutions
Published in IEEE Communications surveys and tutorials (01-01-2004)“…Multicasting is an efficient communication mechanism for group-oriented applications such as videoconferencing, broadcasting stock quotes, interactive group…”
Get full text
Journal Article -
12
Energy-efficient mechanisms in security of the internet of things: A survey
Published in Computer networks (Amsterdam, Netherlands : 1999) (09-11-2017)“…Security primitives in the IoT (Internet of Things) are energy consuming. Finding the best solutions that reduce energy consumption while ensuring the required…”
Get full text
Journal Article -
13
Efficient and lightweight group rekeying protocol for communicating things
Published in Computers & electrical engineering (01-05-2021)“…Recent advances in emerging technologies have given birth to a new type of networks called Internet of Things (IoT). The emergence of IoT has led practitioners…”
Get full text
Journal Article -
14
A survey on recent contention-free MAC protocols for static and mobile wireless decentralized networks in IoT
Published in Computer networks (Amsterdam, Netherlands : 1999) (24-12-2021)“…Medium Access Control (MAC) protocols for wireless decentralized networks in IoT have attracted a lot of attention in both academic and industrial fields. They…”
Get full text
Journal Article -
15
Healing on the cloud: Secure cloud architecture for medical wireless sensor networks
Published in Future generation computer systems (01-02-2016)“…There has been a host of research works on wireless sensor networks (WSN) for medical applications. However, the major shortcoming of these efforts is a lack…”
Get full text
Journal Article -
16
A survey of energy-efficient context recognition systems using wearable sensors for healthcare applications
Published in Pervasive and mobile computing (01-06-2017)“…Human context recognition (HCR) from on-body sensor networks is an important and challenging task for many healthcare applications because it offers continuous…”
Get full text
Journal Article -
17
The Topology Change Attack: Threat and Impact
Published in Journal of Universal Computer Science (01-01-2009)“…Peer to peer (P2P) network has received in past few years a significant attention, especially such file sharing network as eDonkey [Kulbak and Kirkpatrick,…”
Get full text
Journal Article -
18
Energy Efficiency in Security of 5G-Based IoT: An End-to-End Adaptive Approach
Published in IEEE internet of things journal (01-07-2020)“…The challenging problem of energy efficiency in security of the Internet of Things (IoT) is tackled in this article. The authors consider the upcoming…”
Get full text
Journal Article -
19
Methods for detecting and removing ocular artifacts from EEG signals in drowsy driving warning systems: A survey
Published in Multimedia tools and applications (01-05-2023)“…In the last decade, drowsiness while driving has been identified as a major factor behind a large number of fatal traffic accidents around the world. This…”
Get full text
Journal Article -
20
An accountable privacy-preserving scheme for public information sharing systems
Published in Computers & security (01-06-2020)“…Due to the emergence of data externalization technologies, as cloud and fog computing, setting up public information-sharing applications has become much…”
Get full text
Journal Article