Aref Meddeb

ORCID: 0000-0002-6678-2223
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Security in Wireless Sensor Networks
  • Advanced Optical Network Technologies
  • Network Traffic and Congestion Control
  • Energy Harvesting in Wireless Networks
  • Software-Defined Networks and 5G
  • IoT and Edge/Fog Computing
  • Advanced Authentication Protocols Security
  • Mobile Ad Hoc Networks
  • RFID technology advancements
  • Wireless Networks and Protocols
  • Wireless Body Area Networks
  • User Authentication and Security Systems
  • Autonomous Vehicle Technology and Safety
  • Opportunistic and Delay-Tolerant Networks
  • Caching and Content Delivery
  • Network Security and Intrusion Detection
  • Human-Automation Interaction and Safety
  • IoT Networks and Protocols
  • Interconnection Networks and Systems
  • Antenna Design and Analysis
  • Blockchain Technology Applications and Security
  • Cryptography and Data Security
  • Advanced Neural Network Applications
  • Indoor and Outdoor Localization Technologies

University of Sousse
2015-2024

Université de Sherbrooke
2024

Tunis El Manar University
2015-2017

Laboratoire Bordelais de Recherche en Informatique
2015

Université de Bordeaux
2015

Institut Polytechnique de Bordeaux
2015

National Engineering School of Tunis
2015

Ofcom
2005-2008

Institut National de la Recherche Scientifique
2002

Polytechnique Montréal
1996-2002

Data transportation and routing in Internet of Things (IoT) is a challenging issue where massive data collection gathering are predictable. The Routing Protocol for Low- power Lossy Networks (RPL) one the best candidates to ensure 6LoWPAN networks. However, RPL vulnerable number attacks related exchanged control messages. In this paper, we propose new secure protocol based on referred as Secure-RPL (SRPL). main aim SRPL prevent misbehaving nodes from maliciously changing message values such...

10.1109/glocom.2016.7841543 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2016-12-01

While time-to-market constraints are accelerating the deployment of a variety fragmented and proprietary IoT products, there is still lack understanding what an service meant to be, its consequences are, how promote standard services. This article gives concise but comprehensive survey definition, regulation, standardization activities. We discuss mainstream standards as well emerging, independent, state-funded projects.

10.1109/mcom.2016.7514162 article EN IEEE Communications Magazine 2016-07-01

Intelligent Transport Systems (ITS) are an essential part of the global world. They play a substantial role for facing many issues such as traffic jams, high accident rates, unhealthy lifestyles, air pollution, etc. Public bike sharing system is one ITS and can be used to collect data from mobiles devices. In this paper, we propose efficient, "Internet Bikes", IoB-DTN routing protocol based on aggregation which applies Delay Tolerant Network (DTN) paradigm Internet Things (IoT) applications...

10.3390/s18092819 article EN cc-by Sensors 2018-08-27

One of the biggest challenges faced when dealing with QoS over Internet is how to deliver an unregulated, connectionless network that was designed, deployed, operated, managed, and commercialized without any perspectives. This article gives a concise but comprehensive overview puzzle. We aim not only at identifying all pieces puzzle, also discovering join them together. These include terminology, definitions standards, architectures, traffic engineering, regulation, accounting, pricing,...

10.1109/mcom.2010.5394035 article EN IEEE Communications Magazine 2010-01-01

In order to improve driving safety and minimize workload, the information provided should be represented in such a way that it is more easily understood imposing less cognitive load onto driver. Augmented Reality Head-up Display (AR- HUD) can facilitate new form of dialogue between vehicle driver; enhance intelligent transportation systems by superimposing surrounding traffic on users view keep drivers roads. this paper, we investigated potential costs benefits using AR cues as dialog We...

10.1016/j.procs.2015.12.024 article EN Procedia Computer Science 2015-01-01

In the three hierarchy architecture Edge-Fog-Cloud, delivering services with low latency is needed from cloud to fog users intermediate of servers.Private and secure communication scheme will be necessary between dynamic servers. Fog servers are in joining leaving fog. This change fogs must transparent users. Our solution lies on introduction a mutual authentication at Edge network layer. We propose user-fog server anonymous which user authenticate each other establish session key without...

10.1109/aiccsa.2017.57 article EN 2017-10-01

Driving is a complex, continuous, and multitask process that involves driver's cognition, perception, motor movements. The way road traffic signs vehicle information displayed impacts strongly attention with increased mental workload leading to safety concerns. Drivers must keep their eyes on the road, but can always use some assistance in maintaining awareness directing potential emerging hazards. Research perceptual human factors assessment needed for relevant correct display of this...

10.1145/3019612.3019643 article EN 2017-04-03

10.1016/j.comnet.2025.111151 article EN cc-by-nc-nd Computer Networks 2025-02-01

10.1016/j.jnca.2019.102465 article EN Journal of Network and Computer Applications 2019-10-22

Nowadays, several universities and institutions make profit from the information technologies to enhance develop their educational strategies attract more learners. Therefore, distance learning (e-learning) learning-on-the-go are adopted by service providers afford flexible education system. In fact, e-learning is gaining popularity worldwide number of learners enrolled in on-line courses growing. This trend explained mainly opportunities provided Cloud Computing. cloud based context,...

10.1109/access.2020.2973325 article EN cc-by IEEE Access 2020-01-01

Security abides a tremendous key requirement in the context of Internet Things (IoT). IoT connects multiple objects together through wired and wireless connections aim enabling ubiquitous interaction where any components can communicate with each other without constraint. One most important elements concept is Wireless Sensor Network (WSN). Due to their unattended shared nature radio for communication, security becomes an issue. sensor nodes are vulnerable jamming. When jammer has ability...

10.1109/vtcfall.2016.7880885 article EN 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall) 2016-09-01

The ubiquitous and plug-and-play characteristics of Ethernet provide a unique opportunity for service providers to-offer variety innovative affordable application-centric services, resulting in much broader networking culture. Before that can really happen, has to overcome some challenging obstacles prove efficient support SLAs, at least similar offered by traditional layer 2 WAN technologies. In this article we describe the most commonly used transport We compare these discuss QoS, CAM,...

10.1109/mcom.2005.1541705 article EN IEEE Communications Magazine 2005-11-01

The following topics are dealt with: cellular radio; Long Term Evolution; mobility management (mobile radio); radio access networks; telecommunication traffic; OFDM modulation; Internet of Things; software defined networking; mobile and resource allocation.

10.1109/wd.2018.8361708 preprint EN 2018-04-01

Security should be an integral part of IoT communication stack facing vulnerabilities imposed by protocol diversity. In this paper, we propose a new multilayer security based on the specifications IEEE 802.15.4 standard, operating at both MAC and 6LoWPAN adaptation layers in order to ensure all essential aspects broad public industrial acceptance. Measurements demonstrate that alternation between end-to-end hop-by-hop protects entire network against internal external attacks with minimum...

10.1109/iwcmc.2017.7986297 article EN 2017-06-01

Summary We formulate and study an intelligent secure house electricity system on the basis of Internet Things. The security sensitive data collected transmitted by sensor nodes installed in home appliances household electrical devices is critical, since can be easily manipulated different types attacks. confidentiality integrity information must assured to insure appropriate timely response. Providing a aggregation mechanism thus very essential protect privacy aggregation. In this paper, we...

10.1002/dac.3347 article EN International Journal of Communication Systems 2017-06-07

Home networks are gaining a large portion of the global wired and wireless network fabric. These present more challenges due to their growing heterogeneity, user high expectations versus scare resources. The continued emergence applications devices with stringent Quality Service Experience requirements call for novel solutions, effective in aggregating managing resources smart house-holds. Software defined networking offers degree flexibility implementing such solutions improve performance...

10.1109/noms.2018.8406195 article EN NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium 2018-04-01

The Internet of Things (IoT) is formed by smart objects and services to interact in real time, that are deployed various applications such as home monitoring, healthcare, cities. However, security concerns should not be overlooked since an adversary could exploit the vulnerabilities design some secure protocols. To this aim, paper we focus particular on broadcast authentication resource constrained devices. This service still its infancy when devices unattended environments. We propose a new...

10.1109/aiccsa.2015.7507270 article EN 2015-11-01
Coming Soon ...