Publications

2013
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
Boubiche DE, Bilami A. CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK. International Journal of Network Security & Its Applications (IJNSA) [Internet]. 2013;4 (2) :35-52. Publisher's VersionAbstract

The wireless sensor networks (WSN) are particularly vulnerable to various attacks at different layers of the protocol stack. Many intrusion detection system (IDS) have been proposed to secure WSNs. But all these systems operate in a single layer of the OSI model, or do not consider the interaction and collaboration between these layers. Consequently these systems are mostly inefficient and would drain out the WSN. In this paper we propose a new intrusion detection system based on cross layer interaction between the network, Mac and physical layers. Indeed we have addressed the problem of intrusion detection in a different way in which the concept of cross layer is widely used leading to the birth of a new type of IDS. We have experimentally evaluated our system using the NS simulator to demonstrate its effectiveness in detecting different types of attacks at multiple layers of the OSI model

A Defense Strategy against Energy Exhausting Attacks in Wireless Sensor Networks
Boubiche DE, Bilami A. A Defense Strategy against Energy Exhausting Attacks in Wireless Sensor Networks. Journal of Emerging Technologies in Web Intelligence [Internet]. 2013;5 :18-27. Publisher's VersionAbstract
One of the most challenging issues in wireless sensor networks is resilience against malicious attacks. Since energy is the most precious resource for these networks, Denial of sleep attacks is recognized as one of the most serious threats. Such attacks exhaust power supply of sensor nodes and can reduce the sensor lifetime from years to days. Authentication and encryption solutions have been proposed to protect the network from denial of sleep attacks. Though, the resources constraint motivates the use of simpler solutions to the same security challenges. In this paper, we survey different types of denial of sleep attacks and we propose a cross layer energy efficient security mechanism to protect the network from these attacks. The cross layer interaction between network Mac and physical layers is mainly exploited to identify the intruders' nodes and prevent sensor nodes from energy exhaust attacks. Simulation results indicate that our proposal is energy efficient and can significantly reduce the effect of denial of sleep attacks. 
2012
Boubiche DE, Bilami A. Un Protocole de Communication Cross Layer pour l’économie d’énergie dans les RCSFs, in JEESI12. ESI Oued-Smar, Alger ; 2012. Publisher's Version
Boubiche DE, Bilami A. A Cross-Layer Energy-efficient Transmission Power Control Mechanism for Wireless Sensor Networks, in 2nd International Symposium on Modelling and Implementation of Complex Systems (MISC12. Constantine, Algeria ; 2012 :97-101. Publisher's Version
A Cross Layer Energy Efficient Security Mechanism for Denial of Sleep Attacks on Wireless Sensor
Boubiche DE, Bilami A, SamirAthmani. A Cross Layer Energy Efficient Security Mechanism for Denial of Sleep Attacks on Wireless Sensor, in Networked Digital Technologies (NDT12). Dubai - UAE ; 2012 :151-164. Publisher's VersionAbstract

Wireless sensor networks are particularly exposed to several kinds of attacks. Due to resources constrained property in WSN, Denial of sleep attacks is recognized as one of the most serious threats. Attacks of this type exhaust power supply of sensor nodes and reduce the sensor lifetime. Most of existing researches propose authentication and encryption solutions to protect the network from denial of sleep attacks. However, it is more efficient to use simpler solutions to the same security challenges due to limited processing capability, memory storage, and energy capacity. In this paper we propose a cross layer energy-efficient security mechanism to protect the network from these attacks. Simulation reveals that our proposal is energy efficient and able to achieve significant performance in term of preventing network nodes from different denial of sleep attacks.

Hidoussi F, Boubiche DE, Bilami A. Un système de détection d’intrusion hiérarchique basé sur une approche de détection hybride, in International Conference on Advanced Communication and Information Systems (ICACIS). Batna, Algeria ; 2012. Publisher's Version
2011
HEEP (Hybrid Energy Efficiency Protocol) based on chain clustering
Boubiche DE, Bilami A. HEEP (Hybrid Energy Efficiency Protocol) based on chain clustering. International Journal of Sensor Networks (Impact Factor: 0.975) [Internet]. 2011;10 (1) :25 - 35. Publisher's VersionAbstract

Wireless Sensor Networks have emerged as a new information-gathering system based on the collaborative efforts of large number of tiny sensors with limited resource. Energy constraints distinguish sensors networks from other wireless communication networks. Energy efficiency and network lifetime have been the focus of many research works on sensor networks, such as energy aware routing. This paper suggests a new routing protocol called HEEP which combines two algorithms: LEACH and PEGASIS. HEEP advise a new network self-organisation approach, that join clusters-based and the chain-based approaches. This new approach is called chains clustering approach. Organising the network nodes in chains clusters avoids the bad energy dissipation in LEACH protocol and reduces the routing delay generated by PEGASIS protocol. The experimental results show that HEEP outperforms LEACH and LEACH-C with more 110% of network lifetime, and reduces the routing delay introduced in PEGASIS by 50%.

2010
Boubiche DE, Bilami A. Mécanisme d’authentification pour la Sécurité dans les RCSF“, Proceeding of International Conference on Next Generation Networks and services (NGNS’10), in International Conference on Next Generation Networks and services (NGNS’10). Marrakech-Maroc ; 2010. Publisher's Version
SamirAthmani, Bilami A, Boubiche DE. Mécanisme de Contrôle d’Authentification pour la Sécurité dans les RCSF, in Journées d’Etudes Doctorales JED’10 . Anaba ; 2010 :60-66. Publisher's Version
2008
Boubiche DE, Bilami A. Une approche hybride dans le routage pour une économie d’énergie dans les R.C.S.F, in 6 ème Séminaire National en Informatique Biskra (SNIB08). Biskra - Algeria ; 2008 :125-130. Publisher's Version
Boubiche DE, Bilami A. Protocole de Routage à Base de Clusters à Chaînes Statiques dans les R.C.S.F, in 1stWorkshop on Next Generation Networks: Mobility (WNGN 2008). Fès-Maroc ; 2008.
Bilami A, Boubiche DE. A hybrid Energy Aware Routing Algorithm for Wireless Sensor Networks, in The Thirteenth IEEE Symposium on Computers and Communications (ISCC’08). Marrakech-Maroc ; 2008 :975-980. Publisher's VersionAbstract

One of the weaknesses of wireless sensors networks (WSN) is the limit of energy which affects networkpsilas lifetime. To increase the lifetime of the sensor network, this paper suggests a new routing approach which combines two algorithms: LEACH and PEGASIS. In our proposal, nodes belonging to the same cluster form a chain where nodes communicate only with their closest neighbors, so that energy dissipation within clusters can be minimized and consequently, lifetime of the network can be improved. Simulations using Network Simulator ns2 have been conducted to study the behavior of our routing algorithm. Its performances are evaluated and compared to those of different existing algorithms (LEACH, LEACH-C, and PEGASIS).

Pages