Department of Computer Engineering and Computational Sciences

Permanent URI for this collection

Browse

Recent Submissions

Now showing 1 - 20 of 112
  • Item
    Delay Analysis of Routing Protocols for WSN
    (Institute of Electrical and Electronics Engineers Inc., 2023) Bensaid, Rahil; Mnaouer, Adel Ben; Boujemaa, Hatem
  • Item
    Trapezoidal fully fuzzy Sylvester matrix equation with arbitrary coefficients
    (Springer Science and Business Media Deutschland GmbH, 2024) Elsayed, Ahmed Abdelaziz; Ahmad, Nazihah; Malkawi, Ghassan
  • Item
    Performance Analysis of LoRa for Rice Fading Channels
    (Institute of Electrical and Electronics Engineers Inc., 2023) Mahjoub, Takoua; Ben Mnaouer, Adel; Boujemaa, Hatem; Ben Said, Maymouna
  • Item
    Blockchain-Based Key Management Solution for Clustered Flying Ad-Hoc Network
    (Institute of Electrical and Electronics Engineers Inc., 2023) Abdelhafidh, Maroua; Zaghdoud, Nesrine; Charef, Nadia; Ben Mnaouer, Adel
  • Item
    A Comparative Study of Post-Quantum Cryptographic Algorithm Implementations for Secure and Efficient Energy Systems Monitoring
    (Multidisciplinary Digital Publishing Institute (MDPI), 2023-09) Satrya, Gandeva Bayu; Agus, Yosafat Marselino; Mnaouer, Adel Ben
    The Internet of Things (IoT) has assumed a pivotal role in the advancement of communication technology and in our daily lives. However, an IoT system such as a smart grid with poorly designed topology and weak security protocols might be vulnerable to cybercrimes. Exploits may arise from sensor data interception en route to the intended consumer within an IoT system. The increasing integration of electronic devices interconnected via the internet has galvanized the acceptance of this technology. Nonetheless, as the number of users of this technology surges, there must be an aligned concern to ensure that security measures are diligently enforced within IoT communication systems, such as in smart homes, smart cities, smart factories, smart hospitals, and smart grids. This research addresses security lacunae in the topology and configuration of IoT energy monitoring systems using post-quantum cryptographic techniques. We propose tailored implementations of the Rivest–Shamir–Adleman (RSA), N-th degree Truncated Polynomial Ring Units (NTRU), and a suite of cryptographic primitives based on Module Learning With Rounding (Saber) as post-quantum cryptographic candidate algorithms for IoT devices. These aim to secure publisher–subscriber end-to-end communication in energy system monitoring. Additionally, we offer a comparative analysis of these tailored implementations on low-resource devices, such as the Raspberry Pi, during data transmission using the Message Queuing Telemetry Transport (MQTT) protocol. Results indicate that the customized implementation of NTRU outperforms both SABER and RSA in terms of CPU and memory usage, while Light SABER emerges as the front-runner when considering encryption and decryption delays. © 2023 by the authors.
  • Item
    On the Application of Blockchain technology for securing Flying Ad-Hoc Networks (FANET)
    (Institute of Electrical and Electronics Engineers Inc., 2023) Zaghdoud, Nesrine; Abdelhafidh, Maroua; Charef, Nadia; Ben Mnaouer, Adel; Boujemaa, Hatem; Touati, Farid
  • Item
    Performance Analysis of Cooperative LoRa with Dual Hop DF Relaying and Best Relay Selection
    (Institute of Electrical and Electronics Engineers Inc., 2023) Mahjoub, Takoua; Mnaouer, Adel Ben; Boujemaa, Hatem; Said, Maymouna Ben
  • Item
    Performance Analysis of Cooperative LoRa with Multihop Relaying for Rayleigh and Nakagami Channels
    (Springer Science and Business Media Deutschland GmbH, 2023) Mahjoub, Takoua; Ben Mnaouer, Adel; Boujemaa, Hatem; Ben Said, Maymouna
  • Item
    Impact and Research Challenges of Penetrating Testing and Vulnerability Assessment on Network Threat
    (Institute of Electrical and Electronics Engineers Inc., 2023) Fatima, Areej; Khan, Tahir Abbas; Abdellatif, Tamer Mohamed; Zulfiqar, Sidra; Asif, Muhammad; Safi, Waseem; Hamadi, Hussam Al; Al-Kassem, Amer Hani
  • Item
    Malicious Node Detection in Wireless Sensor Networks: Comparative Study
    (Institute of Electrical and Electronics Engineers Inc., 2023) Darwish, Lara; Nassr, Mohammad; Ghosna, Fadi; Fardoun, Habib M.; Voronkova, Daria K.; Anbar, Mohammad
  • Item
    Optimal and Suboptimal Routing Protocols for WSN
    (Springer Science and Business Media Deutschland GmbH, 2023) Bensaid, Rahil; Mnaouer, Adel Ben; Boujemaa, Hatem
    In this paper, we propose one hop, optimal and suboptimal routing protocols for Wireless Sensor Networks (WSNs). The WSN is organized in L hops and N branches between the source S and the destination D. One hop routing activates the best relay in each hop. Optimal routing selects the best path among all NL paths. Suboptimal routing decomposes the network in K subnetworks and activates the best path in each subnetworks. We derive the outage probability of the three studied routing protocols and compare them to simulation results. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.
  • Item
    Routing Protocols with RF Energy Harvesting for WSN
    (Institute of Electrical and Electronics Engineers Inc., 2023) Bensaid, Rahil; Mnaouer, Adel Ben; Boujemaa, Hatem
  • Item
    Data-driven stability of stochastic mean-field type games via noncooperative neural network adversarial training
    (John Wiley and Sons Inc, 2024-03) Barreiro-Gomez, Julian; Choutri, Salah E.
  • Item
    Reducing Delay for Delay-Sensitive Applications in Smart Home Networks Using Openflow Protocol
    (Institute of Electrical and Electronics Engineers Inc., 2023) Alkubeily, Mothanna; Sakulin, Sergey A.; Hasan, Bushra; Fardoun, Habib M.
  • Item
    The role of ICT in the development of children's' with disabilities
    (CEUR-WS, 2022) Fardoun, Habib; Collazos, César A.; Abulfaraj, Anas; Altwijri, Abdulaziz
  • Item
    A survey of blockchain-based solutions for IoTs, VANETs, and FANETs
    (IGI Global, 2022-07-08) Abdelhafidh, Maroua; Charef, Nadia; Mnaouer, Adel Ben; Chaari, Lamia
    Recently, the internet of things (IoT) has gained popularity as an enabling technology for wireless connectivity of mobile and/or stationary devices providing useful services for the general public in a collaborative manner. Mobile ad-hoc networks (MANETs) are regarded as a legacy enabling technology for various IoT applications. Vehicular ad-hoc networks (VANETs) and flying ad-hoc networks (FANETs) are specific extensions of MANETs that are drivers of IoT applications. However, IoT is prone to diverse attacks, being branded as the weakest link in the networking chain requiring effective solutions for achieving an acceptable level of security. Blockchain (BC) technology has been identified as an efficient method to remedy IoT security concerns. Therefore, this chapter classifies the attacks targeting IoT, VANETs, and FANETs systems based on their vulnerabilities. This chapter explores a selection of blockchain-based solutions for securing IoT, VANETs, and FANETs and presents open research directions compiled out of the presented solutions as useful guidelines for the readers. © 2023, IGI Global. All rights reserved.
  • Item
    Toward a knowledge graph for medical diagnosis: issues and usage scenarios
    (Elsevier, 2022-01-01) De Nicola, Antonio; Zgheib, Rita; Taglino, Francesco
  • Item
    IoT-Based Bi-Cluster Forecasting Using Automated ML-Model Optimization for COVID-19
    (MDPI, 2023-03) Tariq, Hasan; Touati, Farid; Crescini, Damiano; Mnaouer, Adel Ben
    The current COVID-19 pandemic has raised huge concerns about outdoor air quality due to the expected lung deterioration. These concerns include the challenges associated with an increase of harmful gases like carbon dioxide, the iterative/repetitive inhalation due to mask usage, and harsh environmental temperatures. Even in the presence of air quality sensing devices, these challenges can hinder the prevention and treatment of respiratory diseases, epidemics, and pandemics in severe cases. In this research, a dual time series with a bi-cluster sensor data-stream-based novel optimized regression algorithm was proposed with optimization predictors and responses that use an automated iterative optimization of the model based on the similarity coefficient index. The algorithm was implemented over SeReNoV2 sensor nodes data, i.e., a multi-variate dual time-series sensor, of the environmental and US Environmental Protection Agency standard, which measures variables for the air quality index using air quality sensors with geospatial profiling. The SeReNoV2 systems were placed at four locations that were 3 km apart to monitor the air quality and their data was collected at Ubidots IoT platform over GSM. The results have shown that the proposed technique achieved a root mean square error (RMSE) of 1.0042 with a training time of 469.28 s for the control and an RMSE of 1.646 in a training time of 28.53 s when optimized. The estimated R-Squared error was 0.03, with the Mean-Square Error for temperature being 1.0084 °C, and 293.98 ppm for CO2. Furthermore, the Mean-Absolute Error (MAE) for temperature was 0.66226 °C and 10.252 ppm for the correlated-CO2 at a predicted speed of ~5100 observations/s. In the sample cluster for temperature, 45,000 observations/s for CO2 was achieved due to the iterative optimization of the training time (469.28 s). The correlated temperature and a time of 28.53 s for CO2 were very promising in forecasting COVID-19 countermeasures before time. © 2023 by the authors.
  • Item
    On performing speech steganalysis using speech recognition and perceptual criteria
    (2010) Rekik, Siwar; Guerchi, Driss; Selouani, Sid-Ahmed; Hamam, Habib
  • Item
    Advanced key distribuation center algorithm (AKDC)
    (2010) Abuazab, Hussam Hussein; Dahmane, Adel Omar; Hamam, Habib