Djallel Eddine Boubiche

ORCID: 0000-0002-1566-3005
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Security in Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • UAV Applications and Optimization
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • Energy Harvesting in Wireless Networks
  • Water Quality Monitoring Technologies
  • Artificial Intelligence in Healthcare
  • E-commerce and Technology Innovations
  • Distributed Control Multi-Agent Systems
  • Big Data Technologies and Applications
  • Cloud Data Security Solutions
  • Mobile Learning in Education
  • Human Mobility and Location-Based Analysis
  • Online and Blended Learning
  • Modular Robots and Swarm Intelligence
  • Advanced Manufacturing and Logistics Optimization
  • Cryptographic Implementations and Security
  • Business Process Modeling and Analysis
  • Wireless Networks and Protocols
  • Embedded Systems and FPGA Applications
  • Big Data and Business Intelligence
  • Molecular Communication and Nanonetworks

University of Batna 1
2013-2022

University of Batna 2
2018-2021

The emergence of new data handling technologies and analytics enabled the organization big in processes as an innovative aspect wireless sensor networks (WSNs). Big paradigm, combined with WSN technology, involves challenges that are necessary to resolve parallel. Data aggregation is a rapidly emerging research area. It represents one processing networks. This paper introduces its main dimensions represent most challenging concepts, principle analytic tools which more introduced WSNs...

10.1109/access.2018.2821445 article EN cc-by-nc-nd IEEE Access 2018-01-01

Examines the market for wireless sensor networks in era and expansion of Internet Things. Over past decade, fast Things (IoT) paradigm communication technologies has raised many scientific engineering challenges that call ingenious research efforts from both academia industry. The IoT now covers several beyond RFID (WSNs). In fact, number potential application fields already exceeded expectations. According to Cisco IBSG, more than 50 billion devices are expected be connected by 2020, with...

10.1109/mcom.2018.8291108 article EN IEEE Communications Magazine 2018-02-01

In this paper, a new computer-supported collaborative learning-based groupware is proposed for supporting problem-based learning in computer programming education setting. The geo-distributed learners can collaboratively with their tutor resolve the common problem within shared workspace. system embeds some synchronous and asynchronous tools that allow to interact each other develop source code of program. This research work has two main objectives. First, it attempts present...

10.1080/0144929x.2020.1795263 article EN Behaviour and Information Technology 2020-07-22

Wireless Sensor Networks have emerged as a new information-gathering system based on the collaborative efforts of large number tiny sensors with limited resource. Energy constraints distinguish networks from other wireless communication networks. efficiency and network lifetime been focus many research works sensor networks, such energy aware routing. This paper suggests routing protocol called HEEP which combines two algorithms: LEACH PEGASIS. advise self-organisation approach, that join...

10.1504/ijsnet.2011.040901 article EN International Journal of Sensor Networks 2011-01-01

Ensuring data aggregation integrity introduces new challenges for security protocols in heterogeneous wireless sensor networks. In this paper, we propose an efficient watermarking based strategy to ensure WSNs. The proposed scheme suggests a fragile technique on dynamic embedding mechanism and cross-layer approach. Compared the existing solutions, our system respects resources limitations of homogenous nodes optimizes process nodes. proposal is evaluated using simulation.

10.1109/lcomm.2015.2409057 article EN IEEE Communications Letters 2015-03-05

The wireless sensor networks (WSN) are particularly vulnerable to various attacks at different layers of the protocol stack.Many intrusion detection system (IDS) have been proposed secure WSNs.But all these systems operate in a single layer OSI model, or do not consider interaction and collaboration between layers.Consequently mostly inefficient would drain out WSN.In this paper we propose new based on cross network, Mac physical layers.Indeed addressed problem way which concept is widely...

10.5121/ijnsa.2012.4203 article EN International Journal of Network Security & Its Applications 2012-03-31

Due to their particular characteristics, wireless sensor networks (WSN) are severely vulnerable malicious attacks. Black hole is one of the most attacks that target sensors routing protocols. This kind can have devastating impact on hierarchical Several security solutions been proposed secure WSNs from black However, these complex and energy inefficient. In this paper we propose a efficient intrusion detection system, protect network Our approach simple based control packets exchange between...

10.1109/wccit.2013.6618693 article EN 2013-06-01

One of the most challenging issues in wireless sensor networks is resilience against malicious attacks. Since energy precious resource for these networks, Denial sleep attacks recognized as one serious threats. Such exhaust power supply nodes and can reduce lifetime from years to days. Authentication encryption solutions have been proposed protect network denial Though, resources constraint motivates use simpler same security challenges. In this paper, we survey different types propose a...

10.4304/jetwi.5.1.18-27 article EN Journal of Emerging Technologies in Web Intelligence 2013-02-01

10.1016/j.compeleceng.2019.04.016 article EN Computers & Electrical Engineering 2019-04-30

Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize packet overhead optimize energy efficiency. Securing process is a real challenge since nodes must access relayed apply functions. The security problem has been widely addressed classical homogeneous networks, however, most proposed protocols cannot guarantee high level node resources are limited. Heterogeneous have recently emerged as new network category which expands...

10.3390/s16040525 article EN cc-by Sensors 2016-04-12

The interest shown by some community of researchers to autonomous drones or UAVs (Unmanned Aerial Vehicles) has increased with the advent wireless communication networks. These networks allow cooperate more efficiently in an ad hoc manner order achieve specific tasks environments. To do so, each drone navigates autonomously while staying connected other nodes its group via radio links. This connectivity can deliberately be maintained for a constraining mobility drones. will suitable involved...

10.1109/icccn.2017.8038487 article EN 2017-07-01

One of the weaknesses wireless sensors networks (WSN) is limit energy which affects networkpsilas lifetime. To increase lifetime sensor network, this paper suggests a new routing approach combines two algorithms: LEACH and PEGASIS. In our proposal, nodes belonging to same cluster form chain where communicate only with their closest neighbors, so that dissipation within clusters can be minimized consequently, network improved. Simulations using Network Simulator ns2 have been conducted study...

10.1109/iscc.2008.4625739 article EN 2008-07-01

Wireless Sensor Networks (WSNs) are a class of technology represented with set sensor nodes. The main objective these nodes is to collect data and monitor an environment's events. basic tasks node can handle sensing (humidity, temperature, fire, etc.), transmitting over short distances, performing limited processing. Common WSNs used in many application fields. resources the (low processing capacity, memory energy reserves) makes them underexploited compared WSNs' spectrum utilization....

10.1145/2816839.2852765 article EN 2015-11-23

Identification schemes based on multivariate polynomials have been receiving attraction in different areas due to the quantum secure property. is one of most important elements for IoT achieve communication between objects, gather and share information with each other. Thus, identification which are post-quantum significant Internet-of-Things (IoT) devices. Various polar forms quadratic cubic polynomial systems proposed these schemes. There a need define form dth degree polynomials, where d...

10.3390/s19040903 article EN cc-by Sensors 2019-02-21
Coming Soon ...