Publications

2016
Toward Adaptive Data Aggregation Protocols in Wireless Sensor Networks
Boubiche DE, Boubiche S, Bilami A, Homero T. Toward Adaptive Data Aggregation Protocols in Wireless Sensor Networks, in International Conference on Internet of things and Cloud Computing. Churchill College, Cambridge University, United Kingdom ; 2016. Publisher's VersionAbstract

Data aggregation has emerged as a basic concept in wireless sensor networks. By combining data and eliminating redundancy, this concept showed its effectiveness in terms of reducing resources consumption. The data aggregation problem is not new and has been widely studied in wireless sensor networks. However, most of the proposed solutions are based on a static data aggregation scheme and do not consider the network constraints evolution such as energy bandwidth, overhead and transmission delay. To dynamically optimize the tradeoff between the data aggregation process and the network constraints, a new paradigm has been introduced recently named the feedback control system. The main idea is to adapt the data aggregation degree to the environment changes and the sensor network applications. The feedback control for data aggregation remains relatively a new research area and only few works have introduced this concept. Therefore this work points out this research field by surveying the different existing protocols.

 

Secure and Efficient Big Data Gathering in Heterogeneous Wireless Sensor Networks
Boubiche DE. Secure and Efficient Big Data Gathering in Heterogeneous Wireless Sensor Networks, in International Conference on Internet of things and Cloud Computing. Churchill College, Cambridge University, UK ; 2016. Publisher's VersionAbstract

The emergence of heterogeneous wireless sensor networks in recent years has helped to address the limitations of conventional WSNs resources and has opened new research areas. When more than one type of node is integrated in a WSN, it is called heterogeneous. Placing heterogeneous nodes in a WSN is an effective way to increase the life of the network. While most of the existing civil and military applications of the heterogeneous WSNs are not materially different from their homogeneous counterparts, there are compelling reasons of incorporating the heterogeneity in the network. These reasons include: improving scalability of wireless sensor networks, reducing energy requirements without sacrificing performance, the equilibration of the cost and the network functionality, improving the security mechanisms using more complex protocols and supporting new broadband applications and big data.

Recently, and because of the growth of the amount of data transmitted in the heterogeneous sensor networks, the term big data has emerged as a widely recognized trend. The term Big Data does not only concern the volume of data but also the high-speed transmission and the variety of information which are difficult to collect, store, and process using available technologies. Although the data generated by the individual sensors may not appear to be significant, all the data generated through the many sensors are capable of producing large volumes of data. The management of big data imposes additional constraints on WSNs. Effectively manage and secure big data gathering is a challenge in heterogeneous WSNs. Therefore, it represents an interesting research area. In this talk, I will address the emerging big data concept in heterogeneous wireless sensor networks and point out its main research issues.

Proceedings of the International Conference on Internet of things and Cloud Computing, ICC'16
Boubiche DE, Hidoussi F. Proceedings of the International Conference on Internet of things and Cloud Computing, ICC'16. ICC '16: International Conference on Internet of things and Cloud Computing [Internet]. 2016;978-1-4503-4063-2. Publisher's VersionAbstract

The volume contains the proceedings of the international conference on Internet of things and Cloud Computing (ICC'2016). The international conference on Internet of things and Cloud Computing (ICC'2016) represents an ideal opportunity for the students and the researchers from both industrial and academic domains having as main objective to present their latest ideas and research results in any one of the ICC'2016 topics.

Proceedings of the International Conference on Big Data and Advanced Wireless Technologies
Boubiche DE, Hamdan H. Proceedings of the International Conference on Big Data and Advanced Wireless Technologies. BDAW '16: International Conference on Big Data and Advanced Wireless Technologies [Internet]. 2016;978-1-4503-4779-2. Publisher's VersionAbstract

The last decades, the fast growth of the information and the communication technology has leaded to overwhelming amount of data pushing our communication network to its limit. The big data volume is produced from an assortment of users and wireless mobile technologies, and are to be processed and stored in powerful datacenters. Indeed, conventional wireless communication networks cannot deal with the massive amount of exchanged data and there is a strong demand to create a fast and scalable inter-connected heterogeneous wireless network for the big data. These advanced big data wireless networks should address all big data lifecycle (access networks, Internet backbone, intra and inter datacenter networks) and satisfy transmission QoS.

SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs
Boubiche DE, Boubiche S, Toral-Cruz H, Pathan A-SK, Bilami A, SamirAthmani. SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommunication Systems (Springer, Impact factor: 1,163) [Internet]. 2016;62 (2) : pages277–288. Publisher's VersionAbstract
Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data transmission. In the recent days, many researchers have focused on securing this paradigm despite the constraints it imposes such as the limited resources. Most of the solutions proposed to secure the data aggregation process in WSNs are essentially based on the use of encryption keys to protect data during their transmission in the network. Indeed, the key generation and distribution mechanisms involve additional computation costs and consume more of energy. Considering this, in this paper, we propose a new security mechanism to secure data aggregation in WSNs called SDAW (secure data aggregation watermarking-based scheme in homogeneous WSNs). Our mechanism aims to secure the data aggregation process while saving energy. For this, the mechanism uses a lightweight fragile watermarking technique without encryption to insure the authentication and the integrity of the sensed data while saving the energy. The links between the sensor nodes and the aggregation nodes, and also the links between the aggregation nodes and the base station are secured by using the watermarking mechanism.
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks
Boubiche S, Boubiche DE, Bilami A, Toral-Cruz H. An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks. Sensors (Impact Factor: 3.031) [Internet]. 2016;16 (4) :525. Publisher's VersionAbstract

Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach

2015
Wireless Sensor Networks
Toral-Cruz H, Hidoussi F, Boubiche DE, Bilami A, Voznak M, Jakovlev S. Wireless Sensor Networks. In: Encyclopedia of Information Science and Technology: 3rd Ed. igi-global ; 2015. Publisher's Version
A Survey on Wireless Sensor Networks
Toral-Cruz H, Hidoussi F, Boubiche DE, Barbosa R, Voznak M, Lakhtaria KI. A Survey on Wireless Sensor Networks. In: Next Generation Wireless Network Security and Privacy. ; 2015. Publisher's VersionAbstract


Wireless sensor networks (WSN) have become one of the most attractive research areas in many scientific fields for the last years. WSN consists of several sensor nodes that collect data in inaccessible areas and send them to the base station (BS) or sink. At the same time sensor networks have some special characteristics compared to traditional networks, which make it hard to deal with such kind of networks. The architecture of protocol stack used by the base station and sensor nodes, integrates power and routing awareness (i.e., energy-aware routing), integrates data with networking protocols (i.e., data aggregation), communicates power efficiently through the wireless medium, and promotes cooperative efforts of sensor nodes (i.e., task management plane).

Advanced Wireless Networks
Boubiche DE. Advanced Wireless Networks, in International Conference on Advanced Wireless Information and Communication Technologies (AWICT‘15) . Vol 73. ENISO, Tunisia ; 2015. Publisher's Version
Cognitive Radio Sensor Networks: Challenges and Application Areas
Boubiche DE. Cognitive Radio Sensor Networks: Challenges and Application Areas, in International Conference on Intelligent Information Processing, Security and Advanced Communication, IPAC. Batna, Algeria ; 2015. Publisher's VersionAbstract

Wireless Sensor Networks (WSNs) are a class of technology represented with a set of sensor nodes. The main objective of these nodes is to collect data and monitor an environment's events. The basic tasks a node can handle are sensing data (humidity, temperature, fire, etc.), transmitting over short distances, and performing limited data processing. Common WSNs are used in many application fields. The limited resources of the WSNs (low processing capacity, memory and energy reserves) makes them underexploited compared to the WSNs' spectrum utilization. Therefore their applications can be significantly increased by enhancing their performance. To address this challenge, cognitive radio sensor networks (CRSNs) examine how wireless sensor nodes with cognitive radio capabilities can address these performance challenges and improve the spectrum utilization. A new kind of WSN (CRSN) with better performance is created throgh the introduction of cognitive radio to traditional sensor networks. This new class of WSNS is more adapted to some specific applications which require more resources capabilities. In this talk, I will offer a perspective on the emerging field of cognitive radio sensor networks and its current applications

Proceedings of the International Conference on Advanced Wireless Information and Communication Technologies
Boubiche DE, Faouzi H, Homero T ed. Proceedings of the International Conference on Advanced Wireless Information and Communication Technologies. International Conference on Advanced Wireless Information and Communication Technologies (AWICT 2015) [Internet]. 2015;73. Publisher's Version
Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication
Boubiche DE, Hidoussi F. Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication. IPAC '15: International Conference on Intelligent Information Processing, Security and Advanced Communication [Internet]. 2015;978-1-4503-3458-7. Publisher's VersionAbstract

The volume contains the proceedings of the international conference on Intelligent Information Processing, Security and Advanced Communication (IPAC'2015). Intelligent information processing (IIP) is one of the most promising research areas due to the fast growing interest of the researcher's community and the multitude of its topics which offer excellent opportunities for novel researches. The rise of people's dependence specifically on advanced communication technologies incites developing high level of reliability, security and availability to ensure secure and reliable services and operations.

Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks
Hidoussi F, Homero T, Boubiche DE, Lakhtaria K, Mihovska A, Voznak M. Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks. Wireless Personal Communications (Springer, Impact Factor: 0,929) [Internet]. 2015;85 :207–224. Publisher's VersionAbstract

 

Despite of their energy efficiency, most of WSN’s cluster-based routing protocols are vulnerable to security threats. Selective forwarding and black hole attacks are ranked among the most devastating attacks which they target this class of routing protocols. In this paper, a new centralized intrusion detection system is proposed to detect selective forwarding and black hole attacks in cluster-based wireless sensors networks. The main idea is the use of a centralized detection approach, where the base station decides on potential intrusions based on control packets sent from the cluster heads. The proposed intrusion detection technique is simple and energy efficient, it is thus suitable for sensor nodes with resource constrained. The simulation results confirm the expected performance of the proposed IDS in terms of security and energy efficiency.

 

A Cross-Layer Communication Protocol with Transmission Power Adjustment for Energy Saving in Multi-hop MhWSNs
Boubiche DE, Bilami A, Boubiche S, Hidoussi F. A Cross-Layer Communication Protocol with Transmission Power Adjustment for Energy Saving in Multi-hop MhWSNs. Wireless Personal Communications (Springer, Impact Factor: 0,929) [Internet]. 2015;85 :151-177. Publisher's VersionAbstract

Introducing a cross-layer scheme to optimize energy consumption in multi hop wireless sensor networks (MhWSNs) is a relatively new approach. Moreover and contrarily to the existing cross-layer MhWSNs architectures, this paper deals with a new cross-layer design based on three-ware cross-layer architecture which exploits an inversed interaction between network, link and physical layers. We propose a cross-layer and hybrid energy efficiency protocol (named CL-HEEP) with transmission power adjustment to preserve the energy reserves in multi-hop MhWSNs. The main idea is the use of routing information to dynamically adjust the transceiver transmission power and to establish cross-layer duty-cycling. An additional wake-up radio is also implied by CL-HEEP to preserve the energy while avoiding compulsory wake-up, idle listening, interference, and collision problems. The simulation reveals that CL-HEEP is energy-efficient and able to achieve significant performance improvement compared to other cross-layer protocols.

A Cross-Layer Watermarking-Based Mechanism for Data Aggregation Integrity in Heterogeneous WSNs
Boubiche DE, Boubiche S, Bilami A. A Cross-Layer Watermarking-Based Mechanism for Data Aggregation Integrity in Heterogeneous WSNs. IEEE Communications Letters, (Impact Factor: 3,457) [Internet]. 2015;19 (5) : 823 - 826. Publisher's VersionAbstract

Ensuring data aggregation integrity introduces new challenges for data aggregation security protocols in heterogeneous wireless sensor networks. In this paper, we propose an efficient watermarking based security strategy to ensure data aggregation integrity in heterogeneous WSNs. The proposed security scheme suggests a new fragile watermarking technique based on a dynamic embedding mechanism and a cross-layer approach. Compared to the existing heterogeneous security solutions, our system respects the resources limitations of the homogenous sensor nodes and optimizes the data aggregation process on the heterogeneous aggregation nodes. The proposal is evaluated using simulation.

2014
Hidoussi F, Toral-Cruz H, Boubiche DE. IDS based on Misuse Detection for Cluster-Based WSN, in Networking and Electronic Commerce Research Conference (NAEC 2014). Trieste, Italy ; 2014. Publisher's Version
Boubiche S, Boubiche DE, Bilami A, SamirAthmani. An Efficient Fragile Watermarking-based Scheme to Secure Data Aggregation in Homogenous WSNs, in Networking and Electronic Commerce Research Conference (NAEC 2014). Trieste, Italy ; 2014. Publisher's VersionAbstract

Data aggregation in wireless sensor networks (WSNs) is an important paradigm which aims to eliminate the problem of redundant data transmission, by combining similar data. Consequently the resources consumption will be reduced. Securing this paradigm is a critical challenge due to constraints it imposes such as the limited resources. Several protocols have been proposed to secure data aggregation process in WSNs. Most of these proposed protocols suggest solutions to secure the communication links between the aggregation nodes and the base station and do not consider security in the low level where compromising the sensor nodes leads to corrupted sensed data, which may alter discreetly the aggregation result. In this paper, we propose a new security mechanism to secure data aggregation in WSNs. Our mechanism aims to secure the sensor nodes level using a lightweight fragile watermarking technique to insure authentication and integrity of sensed data and to secure the links between the nodes and the base station.

Boubiche DE, Boubiche S, Bilami A, Toral-Cruz H. Feedback Control for Data Aggregation in Wireless Sensor Networks: A Survey, in Networking and Electronic Commerce Research Conference (NAEC 2014). Trieste, Italy ; 2014. Publisher's Version
2013
SamirAthmani, Boubiche DE, Bilami A. Hierarchical Energy Efficient Intrusion Detection System for Black Hole Attacks in WSNs, in International Conference on Networking and Grid Cloud Computing (IEEE ICNGCC). Sousse, Tunisia ; 2013. Publisher's VersionAbstract

Due to their particular characteristics, wireless sensor networks (WSN) are severely vulnerable to malicious attacks. Black hole is one of the most malicious attacks that target sensors routing protocols. This kind of attacks can have devastating impact on hierarchical routing protocols. Several security solutions have been proposed to secure WSNs from black hole attacks. However, most of these solutions are complex and energy inefficient. In this paper we propose a hierarchical energy efficient intrusion detection system, to protect sensor network from black hole attacks. Our approach is simple and based on control packets exchange between sensor node and base station. We have experimentally evaluated our system using the NS simulator to demonstrate its effectiveness in detecting and preventing efficiently the black hole attacks.

SamirAthmani, Boubiche DE, Bilami A. Hierarchical Energy Efficient Intrusion Detection System for Selective Forwarding Attacks in WSNs, in 1st International Conference on Networking and Advanced Systems (ICNAS’ 13). Anaba, Algeria ; 2013. Publisher's Version

Pages