- Energy Efficient Wireless Sensor Networks
- Security in Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- UAV Applications and Optimization
- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Energy Harvesting in Wireless Networks
- Water Quality Monitoring Technologies
- Artificial Intelligence in Healthcare
- E-commerce and Technology Innovations
- Distributed Control Multi-Agent Systems
- Big Data Technologies and Applications
- Cloud Data Security Solutions
- Mobile Learning in Education
- Human Mobility and Location-Based Analysis
- Online and Blended Learning
- Modular Robots and Swarm Intelligence
- Advanced Manufacturing and Logistics Optimization
- Cryptographic Implementations and Security
- Business Process Modeling and Analysis
- Wireless Networks and Protocols
- Embedded Systems and FPGA Applications
- Big Data and Business Intelligence
- Molecular Communication and Nanonetworks
University of Batna 1
2013-2022
University of Batna 2
2018-2021
The emergence of new data handling technologies and analytics enabled the organization big in processes as an innovative aspect wireless sensor networks (WSNs). Big paradigm, combined with WSN technology, involves challenges that are necessary to resolve parallel. Data aggregation is a rapidly emerging research area. It represents one processing networks. This paper introduces its main dimensions represent most challenging concepts, principle analytic tools which more introduced WSNs...
Examines the market for wireless sensor networks in era and expansion of Internet Things. Over past decade, fast Things (IoT) paradigm communication technologies has raised many scientific engineering challenges that call ingenious research efforts from both academia industry. The IoT now covers several beyond RFID (WSNs). In fact, number potential application fields already exceeded expectations. According to Cisco IBSG, more than 50 billion devices are expected be connected by 2020, with...
In this paper, a new computer-supported collaborative learning-based groupware is proposed for supporting problem-based learning in computer programming education setting. The geo-distributed learners can collaboratively with their tutor resolve the common problem within shared workspace. system embeds some synchronous and asynchronous tools that allow to interact each other develop source code of program. This research work has two main objectives. First, it attempts present...
Wireless Sensor Networks have emerged as a new information-gathering system based on the collaborative efforts of large number tiny sensors with limited resource. Energy constraints distinguish networks from other wireless communication networks. efficiency and network lifetime been focus many research works sensor networks, such energy aware routing. This paper suggests routing protocol called HEEP which combines two algorithms: LEACH PEGASIS. advise self-organisation approach, that join...
Ensuring data aggregation integrity introduces new challenges for security protocols in heterogeneous wireless sensor networks. In this paper, we propose an efficient watermarking based strategy to ensure WSNs. The proposed scheme suggests a fragile technique on dynamic embedding mechanism and cross-layer approach. Compared the existing solutions, our system respects resources limitations of homogenous nodes optimizes process nodes. proposal is evaluated using simulation.
The wireless sensor networks (WSN) are particularly vulnerable to various attacks at different layers of the protocol stack.Many intrusion detection system (IDS) have been proposed secure WSNs.But all these systems operate in a single layer OSI model, or do not consider interaction and collaboration between layers.Consequently mostly inefficient would drain out WSN.In this paper we propose new based on cross network, Mac physical layers.Indeed addressed problem way which concept is widely...
Due to their particular characteristics, wireless sensor networks (WSN) are severely vulnerable malicious attacks. Black hole is one of the most attacks that target sensors routing protocols. This kind can have devastating impact on hierarchical Several security solutions been proposed secure WSNs from black However, these complex and energy inefficient. In this paper we propose a efficient intrusion detection system, protect network Our approach simple based control packets exchange between...
One of the most challenging issues in wireless sensor networks is resilience against malicious attacks. Since energy precious resource for these networks, Denial sleep attacks recognized as one serious threats. Such exhaust power supply nodes and can reduce lifetime from years to days. Authentication encryption solutions have been proposed protect network denial Though, resources constraint motivates use simpler same security challenges. In this paper, we survey different types propose a...
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize packet overhead optimize energy efficiency. Securing process is a real challenge since nodes must access relayed apply functions. The security problem has been widely addressed classical homogeneous networks, however, most proposed protocols cannot guarantee high level node resources are limited. Heterogeneous have recently emerged as new network category which expands...
The interest shown by some community of researchers to autonomous drones or UAVs (Unmanned Aerial Vehicles) has increased with the advent wireless communication networks. These networks allow cooperate more efficiently in an ad hoc manner order achieve specific tasks environments. To do so, each drone navigates autonomously while staying connected other nodes its group via radio links. This connectivity can deliberately be maintained for a constraining mobility drones. will suitable involved...
One of the weaknesses wireless sensors networks (WSN) is limit energy which affects networkpsilas lifetime. To increase lifetime sensor network, this paper suggests a new routing approach combines two algorithms: LEACH and PEGASIS. In our proposal, nodes belonging to same cluster form chain where communicate only with their closest neighbors, so that dissipation within clusters can be minimized consequently, network improved. Simulations using Network Simulator ns2 have been conducted study...
Wireless Sensor Networks (WSNs) are a class of technology represented with set sensor nodes. The main objective these nodes is to collect data and monitor an environment's events. basic tasks node can handle sensing (humidity, temperature, fire, etc.), transmitting over short distances, performing limited processing. Common WSNs used in many application fields. resources the (low processing capacity, memory energy reserves) makes them underexploited compared WSNs' spectrum utilization....
Identification schemes based on multivariate polynomials have been receiving attraction in different areas due to the quantum secure property. is one of most important elements for IoT achieve communication between objects, gather and share information with each other. Thus, identification which are post-quantum significant Internet-of-Things (IoT) devices. Various polar forms quadratic cubic polynomial systems proposed these schemes. There a need define form dth degree polynomials, where d...