abdelhafid abouaissa

abdelhafid abouaissa

Université de Haute-Alsace

H-index: 15

Europe-France

abdelhafid abouaissa Information

University

Université de Haute-Alsace

Position

___

Citations(all)

718

Citations(since 2020)

370

Cited By

459

hIndex(all)

15

hIndex(since 2020)

11

i10Index(all)

25

i10Index(since 2020)

12

Email

University Profile Page

Université de Haute-Alsace

abdelhafid abouaissa Skills & Research Interests

QoS

IoT

AI

E-healt

Blockchain

Top articles of abdelhafid abouaissa

SA-O2DCA: Seasonal Adapted Online Outlier Detection and Classification Approach for WSN

Wireless Sensor Networks (WSNs) play a critical role in the Internet of Things by collecting information for real-world applications such as healthcare, agriculture, and smart cities. These networks consist of low-resource sensors that produce streaming data requiring online processing. However, since data outliers can occur, it’s important to identify and classify them as errors or events using outlier detection and classification techniques. In this paper, we propose a new and enhanced approach for online outlier detection and classification in WSNs. Our approach is titled SA-O2DCA for Seasonal Adapted Online Outlier Detection and Classification Approach. SA-O2DCA, combines the benefits of the K-means algorithm for clustering, the Iforest algorithm for outlier detection and the Newton interpolation to classify the outliers. We evaluate our approach against other works in literature using multivariate datasets. The …

Authors

Mustafa Al Samara,Ismail Bennis,Abdelhafid Abouaissa,Pascal Lorenz

Journal

Journal of Network and Systems Management

Published Date

2024/4

An intelligent optimization strategy for nurse-patient scheduling in the Internet of Medical Things applications

In the last years, the world has witnessed a potential increasing in the patient number resulted from the increasing number of aged persons along with the emergence of new virus and diseases. This imposes a high pressure on hospitals that suffer from a shortage of medical staff, personal equipment and adequate interventions to overcome such a challenge. Particularly, nurse scheduling is becoming a crucial operation to hospitals in order to efficiently handing the patents and increasing the performance of health system. In this paper, we present an efficient Nurse-Patient Scheduling (NPS) mechanism that is based on the patient classification according to the severity levels of their vital signs. The main goal of NPS is to balance the workload of nurses and it consists of three phases: patient monitoring, patient classification, and nurse scheduling. The first phase aims to periodically monitor the patients using a …

Authors

Hassan Harb,Aline Abboud,Ameer Sardar Kwekha Rashid,Ghina Saad,Abdelhafid Abouaissa,Lhassane Idoughmar,Mouhammad AlAkkoumi

Journal

Egyptian Informatics Journal

Published Date

2024/3/1

Complete outlier detection and classification framework for WSNs based on OPTICS

Wireless Sensor Networks (WSNs) consist of multi-functional sensors with limited resources that collect information in various applications (medical, manufacturing, militarily, etc.). However, data gathered by sensors are susceptible to outliers, which need to be detected and classified into errors and events using outlier detection and classification methods. This paper proposes a centralised outlier detection and classification approach for WSNs, which can distinguish between errors due to a faulty sensor and those due to an event. Also, it considers the spatial–temporal correlation between neighbouring sensor nodes and sensors’ data values. Our approach, titled OPTICS-K, combines the benefits of the Ordering Points To Identify the Clustering Structure (OPTICS) algorithm for clustering, the Inter-Cluster Distance (ICD) method and the K-Nearest Neighbours (KNN) algorithm for outlier detection. Furthermore …

Authors

Mustafa Al Samara,Ismail Bennis,Abdelhafid Abouaissa,Pascal Lorenz

Journal

Journal of Network and Computer Applications

Published Date

2023/2/1

Octa Pillars-based Approach to Select the Best Blockchain-based Solutions in Healthcare Information Exchange

Nowadays, health care has become a constant concern of all countries around the world, especially after the emergence of the Coronavirus (COVID-19) and all its variants. Billions of dollars are being paid through the World Health Organization to improve health care. Scientific research laboratories play a pioneering role in this area as well. Due to the importance of information related to the patient and his medical history, it is necessary to exchange these information between various health centers in order to be better treated. Security in Health care information exchange (HIE) plays an important role because different healthcare facilities (HCFs) exchange sensitive data which can affect the patient’s privacy. Researchers propose many approaches in order to enhance security and maintain privacy. They also try to solve many drawbacks in this field like efficiency, accuracy, and scalability. Unfortunately, all the …

Authors

Joseph Merhej,Hassan Harb,Abdelhafid Abouaissa,Lhassane Idoumghar,Samir Ouchani

Published Date

2023/6/19

A Comparative Study of Blockchain Development Platforms

Blockchain technology is nowadays applied to several domains, essentially finance, healthcare, supply chain, and digital identity management. For enterprises to adopt a blockchain solution, many existing platforms facilitate the development process rather than implementing the system from scratch. Each platform has its own characteristics, capabilities, and limitations. Thus, several factors should be considered, including the consensus mechanism, the programming language, scalability, and security, as well as the popularity and maturity of the platform. Using a scoring approach, we provide a comparative analysis of the 12 most commonly used platforms, which facilitates comparison and selection of the most suitable platform for a developer’s application.

Authors

Kenza Riahi,Mohamed-El-Amine Brahmia,Abdelhafid Abouaissa,Lhassane Idoumghar

Published Date

2023/12/14

Algorithme hybride basé sur NSGA-II pour le déploiement de réseaux de capteurs sans fil

Le problème du déploiement de réseaux de capteurs sans fil (RCSF) est un problème d’optimisation combinatoire NP-difficile [1]. La complexité de ce problème dépend de plusieurs facteurs tels que le type de zone d’intérêt (indoor/outdoor), sa modélisation (2D/3D), la prise en compte ou non d’obstacles, l’hétérogénie des obstacles, l’hétérogénie des capteurs, ainsi que le nombre des fonctions objectif à optimiser [2]. Nos travaux visent à étudier le problème de déploiement de capteurs électromagnétiques dans les bâtiments intelligents en se basant sur le BIM1. Dans le cadre ce papier, nous nous focalisons uniquement sur l’approche multi-objectif proposée sans traiter la modélisation des capteurs et de la zone d’intérêt.

Authors

Khaoula Zaimen,Laurent Moalic,Abdelhafid Abouaissa,Lhassane Idoumghar

Journal

Bulletin de la ROADEF

Published Date

2023

Flophet: A Novel Prophet-Based Model for Traffic Flow Prediction in Vehicular Ad Hoc Networks

The rapid economic growth along with the population concentration in urban areas have led to caused urban traffic problem. It is one of the most serious problems in big cities that people have to deal in daily life. In recent years, researchers show wide interest in overcoming traffic issues where new models and frameworks have been rapidly developed for efficient traffic management in suitable vehicular environments; the emergence of Vehicular Ad Hoc Networks (VANETs). Nevertheless, traffic flow prediction is a major challenge in VANETs that has taken much attention. Subsequently, performing accurate and real-time traffic flow prediction plays an important role in reducing traffic congestion, saving traveler time, improving traffic safety, detect accidents rapidly, and reduce infrastructure damage. In this paper, we propose an efficient traffic prediction model called prophet traffic flow predictor (Flophet) for vehicular …

Authors

Kawthar Zaraket,Hassan Harb,Ismail Bennis,Ali Jaber,Abdelhafid Abouaissa

Published Date

2023/5/28

DeepChain: A Deep Learning and Blockchain Based Framework for Detecting Risky Transactions on HIE System

Nowadays, Healthcare Information Exchange (HIE) plays a vital role in healthcare systems; it allows healthcare providers to access and share patient medical data electronically and securely. Subsequently, HIE eliminates redundant or unnecessary testing, and improves public health reporting and monitoring. Security is a very important challenge in the HIE systems since data are exchanged between different healthcare facilities (HCF), thus, the data are subject to be modified or altered. Hence, detecting modified or risky transactions is becoming a fundamental operation in HIE systems. In this paper, we propose a secure framework that combines between deep learning and blockchain, called as DeepChain, for detecting risky transactions in HIE systems. On one hand, DeepChain uses two types of blockchain to enhance the data security: a blockchain to store ordinary patient data, and an off-chain to store the …

Authors

Joseph Merhej,Hassan Harb,Abdelhafid Abouaissa,Lhassane Idoumghar

Published Date

2023/12/14

O2DCA: Online Outlier Detection and Classification Approach for WSN

Today's scientific and corporate communities are highly interested in Wireless Sensor Networks (WSNs) and the Internet of Things (IoT). This kind of network consists of sensors with low resources that gather information for various real-life applications (healthcare, industrial, security, etc.), with streaming data requiring online processing. However, since outliers may occur in sensors collected data, it is necessary to identify and classify them into errors and events using online outlier detection and classification techniques suitable for the WSNs real-life applications. In this paper, we propose a centralised method for online outlier detection and classification in WSN. Our approach can differentiate between errors caused by malfunctioning sensors and errors caused by events. We also consider the spatial-temporal connection between sensor data vectors and nearby sensor nodes. Our approach, titled O 2 DCA, for …

Authors

Mustafa Al Samara,Ismail Bennis,Abdelhafid Abouaissa,Pascal Lorenz

Published Date

2023/5/28

Borderless Authentic-Authentication in the Upper-Rhine Area with AI

Efficient identity management is not only a concern of the virtual world but also paramount for modern open societies like the European Union. Non-intrusive, AI-based techniques of continuous authentication have recently been proposed to increase the security, efficiency and user friendliness of online systems and services. We introduce the research project aura.ai that will investigate how to transfer and apply these novel means of AI-based authentication in the public transportation area of the Upper-Rhine region.

Authors

Abdelhafid Abouaissa,Wilfrid Azan,Yannick Boehmann,Michael Böttger,Ugo Devoille,Marc Gilg,Christian Zirpins,Roxana Hess,Bastian Leferink,Pascal Lorenz,David Monschein,Zoltan Nochta,José Antonio,Tim Piotrowski,Ioan Szilagyi,Oliver Waldhorst,Jochen Wendel,Oliver Wolf,Martin Gwerder,José Antonio Peregrina Pérez

Published Date

2023/11/16

Connectivity Repair Heuristics for Stationary Wireless Sensor Networks

Wireless sensor network connectivity is a crucial parameter since it keeps the network operative. Network connectivity may be lost due to a variety of factors, such as energy depletion and sensor node failure. Therefore, the network will be partitioned into a set of disjoint sets, resulting in a loss of data collected by isolated sets. In this paper, we address the problem of connectivity repair for stationary sensor networks (WSNs) in case of multiple disjoint partitions. We propose two heuristics based on Dijkstra algorithm and minimum Steiner tree respectively, to deploy the minimum number of additional nodes while preserving the initial topology. For the two heuristics, a procedure is executed in the first stage to merge disjoint sets having a shared zone in their neighboring deployment zones to reduce the complexity of the solution. The first heuristic is adapted to free-obstacle areas and areas with few obstacles. It connects …

Authors

Khaoula Zaimen,Laurent Moalic,Abdelhafid Abouaissa,Lhassane Idoumghar

Published Date

2023/5/28

A comparative study of meta-heuristic algorithms for WSN deployment problem in indoor environments

The wireless sensor deployment problem is one of the major issues in wireless sensor networks (WSNs). It involves designing the optimal network topology within the deployment area in order to maximize network coverage and lifetime and minimize cost and energy consumption under the connectivity constraint. The WSN deployment problem is a challenging NP-hard combinatorial optimization problem due to a number of factors, including the size and the type of the deployment area, the number of obstacles, and the number of objectives to optimize. Consequently, metaheuristics are assumed to be the most efficient methods to compute the deployment scheme in a reasonable amount of time. In this paper, several well-known metaheuristics have been tested on the problem of WSN deployment in indoor environments. The problem has been formulated as a constrained single objective optimization problem, and …

Authors

Khaoula Zaimen,Laurent Moalic,Abdelhafid Abouaissa,Lhassane Idoumghar

Published Date

2023/7/1

A sensing-based patient classification framework for efficient patient-nurse scheduling

Nowadays, hospitals and government departments are struggling to reduce the health costs and improve the service quality. Hospitals rely mainly on nurses who have many duties including caring of patients, communicating with doctors, administering medicine and checking vital signs. Wireless body sensor network (WBSN) is one of the main applications that helps the medical staff in electronic health surveillance with early detection of critical physiological symptoms. However, the rapid growth in the patient number poses a high pressure on hospitals and increases the nurse duties. In addition, WBSN suffers from big data collected by the medical sensors. Therefore, collecting data is one of the major reason behind the exhaustion of limited energy. In this paper, we propose a novel and efficient framework for nurse–patient intelligent task organization that treats the scheduling problem in hospitals. Typically, our …

Authors

Ghina Saad,Hassan Harb,Abdelhafid Abouaissa,Lhassane Idoumghar,Nour Charara

Journal

Sustainable Computing: Informatics and Systems

Published Date

2023/4/1

A Hybrid Aggregation Approach for Federated Learning to Improve Energy Consumption in Smart Buildings

As the world’s economy and urbanization develop rapidly, energy shortages and pollution are becoming major challenges. In general, buildings are responsible for approximately 40% of global energy consumption. To combat this challenge, the adoption of intelligent buildings is strongly recommended. Therefore, through the data collected by the smart buildings, effective solutions should be incorporated to limit their impact on the environment; Machine learning (ML) has proved great success in sensor-based Energy consumption. Trapping in 10-cal optima and slow convergence are the main difficulties of the Backpropagation (BP) learning algorithm. This has an impact on the neural network’s performance. To recover the drawback, this paper proposes a hybrid protocol FedLM-PSO that combines Particle Swarm optimization (PSO) and Levenberg Marquardt (LM) to train MLP models in a Federated Learning …

Authors

Aline Abboud,Abdelhafid Abouaissa,Ahmad Shahin,Rocks Mazraani

Published Date

2023/6/19

ELSO: A Blockchain-Based Technique for a Reliable and Secure Healthcare Information Exchange

Nowadays, healthcare takes a great attention from people and governments due to the emergence of new diseases and viruses. Health Information Exchange (HIE) allows doctors, clinicians, and healthcare facilities (HCF) to exchange and share patient records according to patient permission. Unfortunately, the HIE systems suffer from several challenges such as security, privacy, latency, throughput, and scalability. Thus, researchers proposed many techniques for efficient HIE, but they did not cover all challenges. This paper proposes an efficient architecture called ELSO that combines between public blockchain and off-chain in order to enhance the integrity and privacy of HIE systems. In this architecture, the patient information is divided into two categories: relative data containing personal information that will be stored in the public blockchain; sensitive data describing the patient situation that will be stored in the …

Authors

Joseph Merhej,Hassan Harb,Abdelhafid Abouaissa,Lhassane Idoumghar,Samir Ouchani

Journal

Arabian Journal for Science and Engineering

Published Date

2023/12/26

OPTICS-based outlier detection with newton classification

In today's time, Wireless Sensor Networks (WSNs) and Internet of things (IoTs) have attracted a lot of interest from scientific and businesses communities. They are made up of limited-resource sensors that collect data for various applications (medical, manufacturing, militarily, etc.). However, data collected by sensors are susceptible to have outliers, which need to be detected and classified into errors and events using outlier detection and classification methods. In this paper, we propose a centralized outlier detection and classification approach for WSN. Our solution can distinguish between errors due to a faulty sensor and those due to an event. We also consider the spatial-temporal correlation between sensors' data values and neighbouring sensor nodes. Our approach, titled O 2 DNC for OPTICS-Based Outlier Detection with Newton Classification, combines the benefits of the OPTICS algorithm with a new …

Authors

Mustafa Al Samara,Ismail Bennis,Abdelhafid Abouaissa,Pascal Lorenz

Published Date

2022/5/30

The limitations of unsupervised machine learning for identifying malicious nodes in IoT networks

In today's time, the security in IoT networks interests the scientific community. Indeed, IoT networks are confronted with numerous vulnerabilities, including denial of service, which represents a real threat. The greedy behavior attack is arguably one of the most dangerous and intelligent attacks. Its intelligence lies in the fact that the malicious node executes its attack internally by pretending to be a legitimate node and deliberately falsifying its CSMA-CA parameters. In this paper, we propose a new approach for greedy nodes detection based on an unsupervised machine learning method. In order to evaluate the effectiveness of the proposed method, and to prove the limits of this technique, several attack scenarios were carried out into cooja, and different simulation parameters were taken into account such as the number of packets sent, the energy consumption, and radio status. The detection efficiency of the …

Authors

Fatima Salma Sadek,Abdelhafid Abouaissa,Pascal Lorenz

Published Date

2022/12/4

Recent Advances of Patient Monitoring in Internet of Healthcare Things: A Comparative Study

Healthcare requires the cooperation of many administrative units and medical specialties. The Internet of Things (IoT) is involved into healthcare field and plays an extremely important role by providing healthcare services. In the Internet of Healthcare Things (IoHT) several challenges appeared in terms of limited battery life, long processing time, large amounts of collected data, paquets overhead on sink,…etc. A lot of research studies have been done in order to improve the healthcare IoT based applications. However, these proposed systems have been focused on some specific purpose without ensuring an effective solution for all problems. This paper presents a comparative study for the recent advances in Internet of healthcare monitoring. In addition, an optimized intra WBSN communication (OIC) an is proposed in order to overcome the over-mentioned challenges. OIC is based on merging an energy efficient …

Authors

Ghina Saad,Hassan Harb,Abdelhafid Abouaissa,Nour Charara,Lhassane Idoumghar

Published Date

2022/5/30

FPBFT: A Fast PBFT Protocol for Private Blockchains

Blockchain is an emerging technology that enables storing data and sharing it among many entities without the need for a central organization. Data is stored in an append-only ledger after the majority of participants agree on it. This mechanism is called the consensus, and many protocols are proposed in the literature (PoW, PoS, DPoS, RAFT, PBFT, etc.). In this paper, we focus on the Practical Byzantine Fault Tolerance (PBFT) protocol that has the advantages of being resilient to byzantine nodes, being faster than other protocols and energy saving in contrast to PoW. However, PBFT is not sufficiently scalable due to the important number of messages exchanged before consensus is reached which impacts the delays as well. In this paper, we propose FPBFT, a BFT protocol that is faster and more scalable than the traditional PBFT. We establish a scoring mechanism that eliminates slow and malicious nodes. In …

Authors

Kenza Riahi,Abdelhafid Abouaissa,Lhassane Idoumghar

Published Date

2022/11/29

A Performance Evaluation of In-Memory Databases Operations in Session Initiation Protocol

Real-time communication has witnessed a dramatic increase in recent years in user daily usage. In this domain, Session Initiation Protocol (SIP) is a well-known protocol found to provide trusted services (voice or video) to end users along with efficiency, scalability, and interoperability. Just like other Internet technology, SIP stores its related data in databases with a predefined data structure. In recent, SIP technologies have adopted the real advantages of in-memory databases as cache systems to ensure fast database operations during real-time communication. Meanwhile, in industry, there are several names of in-memory databases that have been implemented with different structures (e.g., query types, data structure, persistency, and key/value size). However, there are limited resources and poor recommendations on how to select a proper in-memory database in SIP communications. This paper provides recommended and efficient in-memory databases which are most fitted to SIP servers by evaluating three types of databases including Memcache, Redis, and Local (OpenSIPS built-in). The evaluation has been conducted based on the experimental performance of the impact of in-memory operations (store and fetch) against the SIP server by applying heavy load traffic through different scenarios. To sum up, evaluation results show that the Local database consumed less memory compared to Memcached and Redis for read and write operations. While persistency was considered, Memcache is the preferable database selection due to its 25.20 KB/s for throughput and 0.763 s of call–response time.

Authors

Ali Al-Allawee,Pascal Lorenz,Abdelhafid Abouaissa,Mosleh Abualhaj

Journal

Network

Published Date

2022/12/28

Firp: Firefly inspired routing protocol for future internet of things

A network of smart sensors, usually called the Internet of Things (IoT), has lately attracted the attention of academia, industry, and government researchers. However, the IoT has faced many challenges and issues which clearly show that the dilemma of today's Internet architecture requires great effort. That’s why the Future Internet of Things (FIoT) has been frequently discussed. We distinguish two characteristics of the FIoT which make it unique: the interconnection of billions of smart objects and the limited resources of these smart objects. Routing Quality of Service (QoS) is a critical issue in this type of network, due to the devices’ characteristics. In this paper, we propose, implement, and evaluate a new bio-inspired routing protocol designed for the FIoT environments called FIRP using the Simple Additive Weight (SAW) Multi-Criteria Decision Making (MCDM) method. The idea of this algorithm was inspired from the …

Authors

Abdelhak Zier,Abdelhafid Abouaissa,Pascal Lorenz

Published Date

2022/5/16

Enhanced efficient outlier detection and classification approach for WSNs

Wireless Sensor Networks (WSNs) are one of the main components of the Internet of things (IoT) for gathering information and monitoring the environment in a variety of applications (medical, agricultural, manufacturing, militarily, etc.). However, data collected by sensors and sent to the base station are susceptible to have outliers. These outliers can occur due to sensor nodes themselves or to the harsh environment where they are deployed. Thus, the WSNs have to detect the outliers and take actions to ensure network quality of service (in terms of reliability, latency, etc.) and to avoid further degradation of the application efficiency. In this paper, we propose an enhanced approach of our previous work to achieve better performance for outlier issues in WSNs. The enhancement tackles the clustering phase and the outlier detection phase. The classification phase remains the same as in the EODCA work by using the …

Authors

Mustafa Al Samara,Ismail Bennis,Abdelhafid Abouaissa,Pascal Lorenz

Journal

Simulation Modelling Practice and Theory

Published Date

2022/11/1

A survey of outlier detection techniques in IoT: Review and classification

The Internet of Things (IoT) is a fact today where a high number of nodes are used for various applications. From small home networks to large-scale networks, the aim is the same: transmitting data from the sensors to the base station. However, these data are susceptible to different factors that may affect the collected data efficiency or the network functioning, and therefore the desired quality of service (QoS). In this context, one of the main issues requiring more research and adapted solutions is the outlier detection problem. The challenge is to detect outliers and classify them as either errors to be ignored, or important events requiring actions to prevent further service degradation. In this paper, we propose a comprehensive literature review of recent outlier detection techniques used in the IoTs context. First, we provide the fundamentals of outlier detection while discussing the different sources of an outlier, the existing approaches, how we can evaluate an outlier detection technique, and the challenges facing designing such techniques. Second, comparison and discussion of the most recent outlier detection techniques are presented and classified into seven main categories, which are: statistical-based, clustering-based, nearest neighbour-based, classification-based, artificial intelligent-based, spectral decomposition-based, and hybrid-based. For each category, available techniques are discussed, while highlighting the advantages and disadvantages of each of them. The related works for each of them are presented. Finally, a comparative study for these techniques is provided.

Authors

Mustafa Al Samara,Ismail Bennis,Abdelhafid Abouaissa,Pascal Lorenz

Published Date

2022/1/4

A Reinforcement Learning-Based Node Selection for PBFT Consensus

Blockchain is nowadays a flourishing technology that served many domains (finance, supply chain, smart cities, healthcare, etc.) thanks to the immutability of data stored on it. In fact, before validating a block and appending it to the blockchain, most of the system nodes should agree on it and reach consensus. One of the most used consensus protocols is the Practical Byzantine Fault Tolerance which tolerates byzantine nodes and works upon asynchronous systems. However, it is not scalable enough because of the increasing number of messages exchanged through the network. Our proposition uses reinforcement learning to adjust the number of participating nodes depending on their behavior and on the actual network state. The number of participating nodes is reduced without affecting the protocol's safety and liveness. Only honest and rapid nodes are included in the consensus set. Malicious nodes are …

Authors

Kenza Riahi,Abdelhafid Abouaissa,Lhassane Idoumghar

Published Date

2022/12/12

A multi-gateway behaviour study for traffic-oriented lorawan deployment

The advantages of LoRaWAN over conventional networks (GSM, 4G, 5G) in terms of investment and operating costs have been proven for network coverage in urban and rural areas. However, the theoretical coverage compared to the reality on the ground and the quality of service (QoS) provided remain very relative and depend on several technical factors, subject to increased research. Several recent approaches and hardware specifications recommended adding gateways as a solution to improve the LoRaWAN QoS indicators, mainly for high-traffic situations. However, such a solution will not work in all real-life scenarios since many factors must be considered. This article presents a study of the factors impacting the LoRaWAN QoS in the case of the usage of multiple gateways by exploring different scenarios to show how the payload length impacts the whole network’s packet delivery ratio (PDR) and how it interacts when enhancing the GW number with and without confirmed traffic. Based on the simulation results, increasing the number of gateways can negatively impact the network’s ability to support higher payload packets, especially in a high-traffic scenario. More precisely, we can say that for a low number of GWs, it is more appropriate to use a high payload length since we can achieve a high PDR. Nevertheless, with a high number of GWs, it would be more appropriate to use a low payload length to achieve a good PDR. Similarly, our analyses show that increasing the number of gateways ensures a better PDR but with a significant packet loss at the gateways, which is synonymous with higher energy consumption.

Authors

Kerima Saleh Abakar,Ismail Bennis,Abdelhafid Abouaissa,Pascal Lorenz

Journal

Future Internet

Published Date

2022/10/29

Modeling the greedy behavior attack and analyzing its impact on iot networks

One of the major security issues in the Internet of Things (IoT) is maintaining the network availability against attacks and traffic congestion. In practice, the greedy behavioral attack is considered as an intelligent Denial of Service (DoS), which aims to compromise the availability of the network by consuming as much as possible the bandwidth of the deployed network. This attack is achieved by tuning the CSMA-CA network communication parameters that plays at the physical layer. In this paper, we propose an efficient modeling technique of attacks proper to the behavior of the greedy node in IoT networks while respecting unslotted IEEE 802.15.4. In fact, our developed greedy nodes algorithm relies on CSMA-CA protocol. This fashioned way of attack representation helped us to easily detect greedy nodes on large-scale IoT networks through simulations. Indeed, the obtained numerical results of different scenarios …

Authors

Fatima Salma Sadek,Khaled Belkadi,Abdelhafid Abouaissa,Samir Ouchani,Pascal Lorenz

Journal

Procedia Computer Science

Published Date

2022/1/1

APBFT: An adaptive PBFT consensus for private blockchains

As smart cities become more decentralized, the need for reliable and secure cyber-physical systems (CPS) that guarantee safe interactions and secure data storage without loss of privacy is continuously increasing. Blockchain is a rapidly emerging technology in this domain. It demonstrated effectiveness thanks to the cryptographic mechanisms it utilizes and to its immutability. Private blockchains are the most suited to applications that require privacy and confidentiality when data is very sensitive. In this case, the most commonly used consensus protocol is Practical Byzantine Fault Tolerance (PBFT). However, PBFT requires the participation of all nodes in the consensus process, which increases bandwidth consumption and consensus delay significantly. In this paper, we propose an adaptive PBFT protocol called APBFT that optimizes the number of nodes participating in the consensus based on their response …

Authors

Kenza Riahi,Abdelhafid Abouaissa,Lhassane Idoumghar

Published Date

2022/12/4

A survey of artificial intelligence based wsns deployment techniques and related objectives modeling

Recent advances in hardware and communication technologies have accelerated the deployment of billions of wireless sensors. This transformation has created a wide range of applications adapted to the evolving trends of our daily life requirements. Wireless sensor networks (WSNs) could be deployed in several target areas including buildings, forests, oceans, and smart cities. Nevertheless, finding the optimal location for each sensor node is a challenging task, typically when the environment involves heterogeneous obstacles. Many approaches and methods have been proposed to deal with the problem of WSN deployment, each addressing one or more objectives and constraints, such as network coverage, lifetime, connectivity, and energy consumption. The purpose of this survey paper is to provide the needed background to understand and study the WSNs deployment problem with a focus on its two key …

Authors

Khaoula Zaimen,Laurent Moalic,Abdelhafid Abouaissa,Lhassane Idoumghar

Published Date

2022/10/26

RPL-OC: Extension of RPL protocol for LLN networks based on the operator calculus approach

Technical constraints imposed by low-power and lossy networks (LLNs) require to defer complexity to routing protocols in order to efficiently and reliably transmit packets. However, despite these constraints, the deployment of this type of network has increased considerably over the last years, particularly in smart cities area with focus on sensing applications. In order to effectively address this challenge, we propose a new mechanism for IPV6 Routing Protocol for LLNs (RPL) based on the Operator Calculus (OC) approach. In this multi-constrained path optimization problem, OC is applied to extract the feasible end-to-end paths while assigning a rank to each network node. Unlike the standard RPL and its variants which adopt a full distributed strategy, the aim is to provide RPL with a tuple containing the most efficient paths from a source node to the sink by considering multiple routing metrics. The definitive …

Authors

Abdusy Syarif,Mohamed-el-Amine Brahmia,Jean-François Dollinger,Abdelhafid Abouaissa,Lhassane Idoumghar

Published Date

2022

An efficient outlier detection and classification clustering-based approach for WSN

Wireless Sensor Network (WSN) is one of the main components of the Internet of things (IoT) for gathering information and monitoring the environment in a variety of applications (medical, agricultural, manufacturing, militarily, etc.). However, data collected and transferred from sensors to the base station are susceptible to have outliers. These outliers can occur due to sensor nodes itself or to the harsh environment where they are deployed. Thus, it is necessary for the WSN to be able to detect the outliers and take actions in order to ensure network quality of service (in terms of reliability, latency, etc.) and to avoid further degradation of the application efficiency. In this paper, we propose a distributed outlier detection and classification algorithm for WSN. Our approach is capable of distinguish between an error due to a faulty sensor and an error due to an interesting event. We take into consideration the spatial …

Authors

Mustafa Al Samara,Ismail Bennis,Abdelhafid Abouaissa,Pascal Lorenz

Published Date

2021/12/7

Identifying misbehaving greedy nodes in IoT networks

One of the central communication infrastructures of the Internet of Things (IoT) is the IEEE 802.15.4 standard, which defines Low Rate Wireless Personal Area Networks (LR- WPAN). In order to share the medium fairly in a non-beacon-enabled mode, the standard uses Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). The nature of connected objects with respect to various resource constraints makes them vulnerable to cyber attacks. One of the most aggressive DoS attacks is the greedy behaviour attack which aims to deprive legitimate nodes to access to the communication medium. The greedy or selfish node may violate the proper use of the CSMA/CA protocol, by tampering its parameters, in order to take as much bandwidth as possible on the network, and then monopolize access to the medium by depriving legitimate nodes of communication. Based on the analysis of the difference between parameters of greedy and legitimate nodes, we propose a method based on the threshold mechanism to identify greedy nodes. The simulation results show that the proposed mechanism provides a detection efficiency of 99.5%.

Authors

Fatima Salma Sadek,Khaled Belkadi,Abdelhafid Abouaissa,Pascal Lorenz

Journal

Sensors

Published Date

2021/7/29

Coverage maximization in WSN deployment using particle swarm optimization with Voronoi diagram

Coverage area maximization is a crucial issue that must be considered in Wireless sensor network (WSN) deployment as long as it impacts the sensor network efficiency. In this paper, a novel approach based on particle swarm optimization (PSO) and voronoi diagram is developed to solve WSN deployment problem. The objective of the proposed solution is to reduce both of the coverage hole and coverage overlapping in the region of interest (RoI). In order to achieve it, the PSO fitness function is designed using voronoi diagram for the purpose of efficiently assessing the coverage hole of a particle solution and therefore, compute the improved deployment of the sensor nodes within the target area. The simulation results demonstrate that the proposed algorithm provides a noteworthy initial coverage enhancement.

Authors

Khaoula Zaimen,Mohamed-el-Amine Brahmia,Jean-François Dollinger,Laurent Moalic,Abdelhafid Abouaissa,Lhassane Idoumghar

Published Date

2021

P2d: An efficient patient-to-doctor framework for real-time health monitoring and decision making

Today, diseases and illnesses are becoming the most dangerous enemy to humans. The number of patients is increasing day after day accompanied with the emergence of new types of viruses and diseases. Indeed, most hospitals suffer from the deficiency of qualified staff needed to continuously monitor patients and act when an urgent situation is detected. Recently, wireless body sensor network (WBSN) has been considered as an efficient technology for real-time health-monitoring applications. It provides a low cost solution for hospitals, performs a relief for staff and allows doctors to remotely track patients. However, the huge amount of data collected by sensors produce two major challenges for WBSN: the quickly depletion of the available sensor energy and the complex decision making by the doctor. In this article, we propose an efficient Patient-to-Doctor (P2D) framework for real-time health monitoring and …

Authors

Ghina Saad,Hassan Harb,Abdelhafid Abouaissa,Lhassane Idoumghar,Nour Charara

Journal

IEEE Sensors Journal

Published Date

2020/7/28

Security against rank attack in RPL protocol

The Routing Protocol for Low Power and Lossy Networks (RPL) is experiencing a wave of security threats, due to the need of its utility in the Internet of Things (IoT). RPL is so far considered as one of the most utilized routing protocols in new IoT applications, which is one of the reasons the latter may lead to confronting challenges later on. In other words, security is thus the primary interest in RPL, regarding the nature of objects and their different constraints that are regularly regarded as security vulnerabilities for cyber-attacks. To continue, it is evident to claim that it is mandatory to determine and analyze all the kinds of attacks that target this protocol, such as the rank attack which is best known for its strongest threats that lead to degraded topology performance and energy consumption of nodes in the network. This study presents an overview of RPL, a proposed taxonomy of all the recent published works about …

Authors

Mohammed Amine Boudouaia,Adda Ali-Pacha,Abdelhafid Abouaissa,Pascal Lorenz

Journal

IEEE Network

Published Date

2020/7/22

A overview on WSN deployment and a novel conceptual BIM-based approach in smart buildings

The rapid growing of Internet of things (IoT) is one of the most important factors of integrating WSN in smart buildings. Furthermore, the presence of these sensors and technologies allow improving the accuracy of the measured data while reducing buildings energy consumption and guaranteeing the comfort required by the indoor users. However, finding the optimal sensor nodes positions in an indoor environment with heterogeneous obstacles is the keystone to ensure a full sensing coverage with a full connectivity. To meet this challenge, various initiatives have been proposed in the literature. First, we summarize the main developed solutions to optimize WSN deployment in an indoor/outdoor environment. Then, we propose our conceptual approach that relies on exploiting BIM (Building information modeling) database to get real time and valid information about the target area. Indeed, the proposed solution can …

Authors

Khaoula Zaimen,Jean-François Dollinger,Laurent Moalic,Abdelhafid Abouaissa,Lhassane Idoumghar

Published Date

2020/12/14

Divide and conquer-based attack against RPL routing protocol

The Internet of Things (IoT) is a new paradigm of networks that offers intelligent connections between different objects of daily basis needs. These connections are clearly characterized by various constraints, such as the high loss rate and the low throughput. To ensure these connections, it is necessary to use routing protocols adapted to these constraints. The routing protocol for low power and lossy networks (RPL) is one of the famous protocols used in this category of networks, thanks to its flexibility and adaptability. In this paper, the study attempts to present the deficiency of the RPL protocol against a new attack called divide and conquer-based attack. The idea is to introduce a malicious node periodically launching a process based on the rank value, in order to deteriorate the network performance. The attack effectiveness is investigated through a detailed simulation using the Cooja simulator in terms of the total …

Authors

Mohammed Amine Boudouaia,Abdelhafid Abouaissa,Ayoub Benayache,Pascal Lorenz

Published Date

2020/12/7

abdelhafid abouaissa FAQs

What is abdelhafid abouaissa's h-index at Université de Haute-Alsace?

The h-index of abdelhafid abouaissa has been 11 since 2020 and 15 in total.

What are abdelhafid abouaissa's top articles?

The articles with the titles of

SA-O2DCA: Seasonal Adapted Online Outlier Detection and Classification Approach for WSN

An intelligent optimization strategy for nurse-patient scheduling in the Internet of Medical Things applications

Complete outlier detection and classification framework for WSNs based on OPTICS

Octa Pillars-based Approach to Select the Best Blockchain-based Solutions in Healthcare Information Exchange

A Comparative Study of Blockchain Development Platforms

Algorithme hybride basé sur NSGA-II pour le déploiement de réseaux de capteurs sans fil

Flophet: A Novel Prophet-Based Model for Traffic Flow Prediction in Vehicular Ad Hoc Networks

DeepChain: A Deep Learning and Blockchain Based Framework for Detecting Risky Transactions on HIE System

...

are the top articles of abdelhafid abouaissa at Université de Haute-Alsace.

What are abdelhafid abouaissa's research interests?

The research interests of abdelhafid abouaissa are: QoS, IoT, AI, E-healt, Blockchain

What is abdelhafid abouaissa's total number of citations?

abdelhafid abouaissa has 718 citations in total.

What are the co-authors of abdelhafid abouaissa?

The co-authors of abdelhafid abouaissa are Jaafar Gaber, Harris Simaremare.

    Co-Authors

    H-index: 24
    Jaafar Gaber

    Jaafar Gaber

    Université de Technologie de Belfort-Montbéliard

    H-index: 8
    Harris Simaremare

    Harris Simaremare

    Université de Haute-Alsace

    academic-engine

    Useful Links