- Mobile Ad Hoc Networks
- Energy Efficient Wireless Sensor Networks
- Network Security and Intrusion Detection
- Opportunistic and Delay-Tolerant Networks
- Blockchain Technology Applications and Security
- Distributed systems and fault tolerance
- Wireless Networks and Protocols
- Security in Wireless Sensor Networks
- Cooperative Communication and Network Coding
- Anomaly Detection Techniques and Applications
- IoT and Edge/Fog Computing
- Vehicular Ad Hoc Networks (VANETs)
- Mobile Agent-Based Network Management
- Energy Harvesting in Wireless Networks
- Privacy-Preserving Technologies in Data
- Advanced Wireless Network Optimization
- Software-Defined Networks and 5G
- Network Traffic and Congestion Control
- Advanced Multi-Objective Optimization Algorithms
- Real-Time Systems Scheduling
- Telecommunications and Broadcasting Technologies
- Interconnection Networks and Systems
- Water Systems and Optimization
- Metaheuristic Optimization Algorithms Research
- Cloud Computing and Resource Management
Université de Haute-Alsace
2013-2024
Centre de Recherche en Informatique
2011-2023
Institut de Sciences des Matériaux de Mulhouse
2023
Laboratoire d'Informatique de Paris-Nord
2022
Institut Icare
2019-2020
Unité de Modélisation Mathématique et Informatique des Systèmes Complexes
2010-2011
Université de technologie de belfort-montbéliard
2002-2005
The Internet of Things (IoT) is a fact today where high number nodes are used for various applications. From small home networks to large-scale networks, the aim same: transmitting data from sensors base station. However, these susceptible different factors that may affect collected efficiency or network functioning, and therefore desired quality service (QoS). In this context, one main issues requiring more research adapted solutions outlier detection problem. challenge detect outliers...
The Routing Protocol for Low Power and Lossy Networks (RPL) is experiencing a wave of security threats, due to the need its utility in Internet Things (IoT). RPL so far considered as one most utilized routing protocols new IoT applications, which reasons latter may lead confronting challenges later on. In other words, thus primary interest RPL, regarding nature objects their different constraints that are regularly regarded vulnerabilities cyber-attacks. To continue, it evident claim...
In the last years, world has witnessed a potential increasing in patient number resulted from of aged persons along with emergence new virus and diseases. This imposes high pressure on hospitals that suffer shortage medical staff, personal equipment adequate interventions to overcome such challenge. Particularly, nurse scheduling is becoming crucial operation order efficiently handing patents performance health system. this paper, we present an efficient Nurse-Patient Scheduling (NPS)...
This paper is a study about deployment strategy for achieving coverage and connectivity as two fundamental issues in wireless sensor networks. To achieve the best deployment, new approach based on elitist non-dominated sorting genetic algorithm (NSGA-II) used. There are objectives this study, coverage. We defined fitness function to nodes deployment. Further we performed simulation verify validate of network an output from proposed mechanism. Some performance parameters have been measured...
One of the greatest challenges in computing and estimating important node metrics a structural graph is centrality. Since centrality an essential concept social network analysis (SNA), it used to define importance like wireless sensor (WSN). Route optimization another feature network. This paper proposes alternative solution route problems by using multi-constrained optimal path (MCOP) approach. A new metric called operator calculus (POC) proposed as way determine nodes with high deployment....
Recent advances in hardware and communication technologies have accelerated the deployment of billions wireless sensors. This transformation has created a wide range applications adapted to evolving trends our daily life requirements. Wireless sensor networks (WSNs) could be deployed several target areas including buildings, forests, oceans, smart cities. Nevertheless, finding optimal location for each node is challenging task, typically when environment involves heterogeneous obstacles....
As the world's economy and urbanization develop rapidly, energy shortages pollution are becoming major challenges. In general, buildings responsible for approximately 40% of global consumption. To combat this challenge, adoption intelligent is strongly recommended. Therefore, through data collected by smart buildings, effective solutions should be incorporated to limit their impact on environment; Machine learning (ML) has proved great success in sensor-based Energy Trapping 10-cal optima...
In this paper we evaluate V-AODV a version of AODV (Ad-hoc On-demand Distance Vector) especially created for Vehicular Ad-hoc NETworks (VANETs). is designed to run with complex cross layered metric based on both delay from node and Bit Error Rate (BER) coming the physical layer. We conducted simulations NS2 simulator taking in account realistic environment tool called Communication Ray Tracer (CRT). Our results show that basic propagation models usually use are not suitable VANETs...
Internet of things is the new era networking and smart communication. Recent researches treat some issues challenges IoT. QoS routing protocols for IoT have been a rising research topic years. In this paper we present approach called E-RPL; it an enhancement Routing Protocol Low power lossy networks (RPL). Comparing to RPL, E-RPL decreases number control messages. The protocol proposes also flexible multi-constrained objective function (OF) that can integrate several metrics including...
Summary Due to the new technologies of Internet Things (IoT), connected objects have become smart interactive devices. However, despite their imminent advantages, whether for daily life users or in professional contexts, and various security solutions proposed literature particular, IoT networks is still a paramount issue given amount confidential data that circulates through these technologies. In other words, among protocols suffer from issues, routing protocol low power lossy (RPL)...
A Mobile Adhoc Network (MANET) is characterized by high mobility, non-infrastructure network, and dynamic topology. This nature make MANET have some constraints such as energy constraints, limited bandwidth, less memory. Energy consumption becomes an important issue in manet to cover the sustainability of communication process. We proposed optimize routing protocol based on AODV for hybrid network. used reverse mechanism protocol. In this paper, we will analyze performance our term...
Summary A mobile ad hoc networks (MANET) is a decentralized, self‐organizing, infrastructure‐less network and adaptive gathering of independent nodes. Because the unique characteristics MANET, major issues to develop routing protocol in MANET are security aspect performance. In this paper, we propose new secure called Trust Ad Hoc On‐demand Distance Vector (AODV) using trust mechanism. Communication packets only sent trusted neighbor calculation based on behaviors activities information each...
The rapid growing of Internet things (IoT) is one the most important factors integrating WSN in smart buildings. Furthermore, presence these sensors and technologies allow improving accuracy measured data while reducing buildings energy consumption guaranteeing comfort required by indoor users. However, finding optimal sensor nodes positions an environment with heterogeneous obstacles keystone to ensure a full sensing coverage connectivity. To meet this challenge, various initiatives have...
As smart cities become more decentralized, the need for reliable and secure cyber-physical systems (CPS) that guarantee safe interactions data storage without loss of privacy is continuously increasing. Blockchain a rapidly emerging technology in this domain. It demonstrated effectiveness thanks to cryptographic mechanisms it utilizes its immutability. Private blockchains are most suited applications require confidentiality when very sensitive. In case, commonly used consensus protocol...
Wireless Sensor Network (WSN) is one of the main components Internet things (IoT) for gathering information and monitoring environment in a variety applications (medical, agricultural, manufacturing, militarily, etc.). However, data collected transferred from sensors to base station are susceptible have outliers. These outliers can occur due sensor nodes itself or harsh where they deployed. Thus, it necessary WSN be able detect take actions order ensure network quality service (in terms...
Nowadays, Healthcare Information Exchange (HIE) plays a vital role in healthcare systems; it allows providers to access and share patient medical data electronically securely. Subsequently, HIE eliminates redundant or unnecessary testing, improves public health reporting monitoring. Security is very important challenge the systems since are exchanged between different facilities (HCF), thus, subject be modified altered. Hence, detecting risky transactions becoming fundamental operation...
Finance, supply chain, healthcare, and energy have an increasing demand for secure transactions data exchange. Permissioned blockchains fulfilled this need thanks to the consensus protocol that ensures participants agree on a common value. One of most widely used protocols in private is Practical Byzantine Fault Tolerance (PBFT) which tolerates up one-third nodes, performs within partially synchronous systems has superior throughput compared other protocols. It has, however, important...