Department of Computer Engineering and Computational Sciences

Permanent URI for this collection


Recent Submissions

Now showing 1 - 5 of 82
  • Item
    Software-Defined Networking for Flying Ad-hoc Network Security: A Survey
    (Institute of Electrical and Electronics Engineers Inc., 2022) Abdelhafidh, Maroua; Charef, Nadia; Mnaouer, Adel Ben; Fourati, Lamia Chaari
    Despite the immense use of single Unmanned Aerial Vehicle (UAV) systems in various applications, it is not yet able to cover large areas with optimized energy consumption. Accordingly, Flying Ad-hoc Network (FANET), as a collaborative groups of UAV s, is tremendously employed in recent research works allowing larger coverage and efficient monitoring. To ensure a secure FANET control, Software-Defined Networking (SDN) based solutions are frequently considered. This work presents and compares the recent SDN-based solutions proposed to reinforce FANET security and reduce its attacks. In addition, open research issues are highlighted with respect to SDN-FANET challenges. © 2022 IEEE.
  • Item
    Wormhole attack mitigation strategies and their impact on wireless sensor network performance: A literature survey
    (John Wiley and Sons Ltd, 2022) Shahid, Hafsa; Ashraf, Humaira; Ullah, Ata; Band, Shahab S.; Elnaffar, Said
    Wireless sensor networks (WSNs) consist of hundreds of small sensors that collect and report data. During data sharing, these WSNs become vulnerable to numerous security threats, including the deadly ones. Mitigating this risk is a real challenge, especially in a low-resource environment such as a WSN. In this work, using a systematic literature review, we surveyed a large body of research (28 studies) that focused on mitigating wormhole security attacks. Through this study, we evaluate the impact of many proposed security schemes and their impact on the WSN's performance. We compare schemes for effectiveness and pinpoint the limitations. We also analyze the various parameters and metrics used in them and highlight the open research challenges in the field. © 2022 John Wiley & Sons Ltd.
  • Item
    When Smart Cities Get Smarter via Machine Learning: An In-Depth Literature Review
    (Institute of Electrical and Electronics Engineers Inc., 2022) Band, Shahab S.; Ardabili, Sina; Sookhak, Mehdi; Chronopoulos, Anthony Theodore; Elnaffar, Said; Moslehpour, Massoud; Csaba, Mako; Torok, Bernat; Pai, Hao-Ting; Mosavi, Amir
    The manuscript represents a comeprehensive and systematic literature review on the machine learning methods in the emerging applications of the smart cities. Application domains include the essential aspects of the smart cities including the energy, healthcare, transportation, security, and pollution. The research methodology presents a state-of-the-art taxonomy, evaluation and model performance where the ML algorithms are classified into one of the following four categories: decision trees, support vector machines, artificial neural networks, and advanced machine learning methods, i.e., hybrid methods, ensembles, and Deep Learning. The study found that the hybrid models and ensembles have better performance since they exhibit both a high accuracy and low overall cost. On the other hand, the deep learning (DL) techniques had a higher accuracy than the hybrid models and ensembles, but they demanded relatively higher computation power. Moreover, all these advanced ML methods had a slower processing speed than the single methods. Likewise, the support vector machine (SVM) and decision tree (DT) generally outperformed the artificial neural network (ANN) for accuracy and other metrics. However, since the difference was negligible, it can be concluded that using either of them is appropriate. © 2013 IEEE.
  • Item
    Enabling blockchain technology for secure networking and communications
    (IGI Global, 2021-06-11) Mnaouer, Adel Ben; Fourati, Lamia Chaari
    In recent years, the surge of blockchain technology has been rising due to is proven reliability in ensuring secure and effective transactions, even between untrusted parties. Its application is broad and covers public and private domains varying from traditional communication networks to more modern networks like the internet of things and the internet of energy crossing fog and edge computing, among others. As technology matures and its standard use cases are established, there is a need to gather recent research that can shed light on several aspects and facts on the use of blockchain technology in different fields of interest. Enabling Blockchain Technology for Secure Networking and Communications consolidates the recent research initiatives directed towards exploiting the advantages of blockchain technology for benefiting several areas of applications that vary from security and robustness to scalability and privacy-preserving and more. The chapters explore the current applications of blockchain for networking and communications, the future potentials of blockchain technology, and some not-yet-prospected areas of research and its application. This book is ideal for practitioners, stakeholders, researchers, academicians, and students interested in the concepts of blockchain technology and the potential and pitfalls of its application in different utilization domains. © 2021 by IGI Global. All rights reserved. All rights reserved.
  • Item
    A survey of blockchain-based solutions for IoTs, VANETs, and FANETs
    (IGI Global, 2021-06-11) Abdelhafidh, Maroua; Charef, Nadia; Mnaouer, Adel Ben; Chaari, Lamia
    Recently, the internet of things (IoT) has gained popularity as an enabling technology for wireless connectivity of mobile and/or stationary devices providing useful services for the general public in a collaborative manner. Mobile ad-hoc networks (MANETs) are regarded as a legacy enabling technology for various IoT applications. Vehicular ad-hoc networks (VANETs) and flying ad-hoc networks (FANETs) are specific extensions of MANETs that are drivers of IoT applications. However, IoT is prone to diverse attacks, being branded as the weakest link in the networking chain requiring effective solutions for achieving an acceptable level of security. Blockchain (BC) technology has been identified as an efficient method to remedy IoT security concerns. Therefore, this chapter classifies the attacks targeting IoT, VANETs, and FANETs systems based on their vulnerabilities. This chapter explores a selection of blockchain-based solutions for securing IoT, VANETs, and FANETs and presents open research directions compiled out of the presented solutions as useful guidelines for the readers. © 2021, IGI Global.