Home Contact Us

Accepted Papers

  • RESIDUAL ENERGY AND DENSITY CONTROL AWARE CLUSTER HEAD ELECTION IN WIRELESS SENSOR NETWORK

    Meriem Meddah, National Engineering School of Tunis, Tunis El Manar and Rim Haddad, High School of communication of Tunis, Carthage
    ABSTRACT

    Don’t miss your chance, go to online casino 25€ bonus ohne einzahlung only here good luck awaits you! In designing the Wireless Sensor Network, the energy consumption represents one of the most and important factor that recent researches aim to reduce efficiently. Because of the limited energy that sensor nodes are equipped with, and in order to prolong the network lifetime, we introduce a new clustering algorithm for WSN, which consists on choosing a subset of sensor nodes to be elected as Cluster Heads.

    What are you still waiting for, go immediately to beste online casino bonus ohne einzahlung now is the time to start playing and winning! This choice is based on three parameters; the residual energy, the density and the distances separating the node with its neighbors. Each node enters into a competition and makes its proper decision. Then, the network is divided into clusters and each member is affected to the nearest CH that has the job to gather the data of the members of its cluster.

    The efficiency of our proposed algorithm is proved comparing with some other clustering approaches. Simulation results show that the energy dissipation of the sensor nodes can be considerably reduced, and the network lifetime efficiently extended. Stop waiting, join the game now with 77777 sizzling hot continuous luck and many victories await you!

  • OPPORTUNISTIC ROUTING IN WIRELESS SENSOR NETWORKS

    Hajer Ben Fradj and Ridha Bouallegue, University of Carthage,Tunisia and Mehdi Bouallegue and Rajoua Anane, LAUM UMR CNRS n 6613, France
    ABSTRACT

    Wireless sensor networks are used in many environmentalmonitoring applications (for example, to monitorvolcanoes or to detect forest fires). In such applications, the sensornodes have a limited amount of energy, but must operate for yearswithout having their batteries changed. Our main objective inthis work will be to present a new idea to calculate the list ofcandidates to minimize energy consumption and increased thelife time of network.

  • A NEW QOT-AWARE HYBRID REROUTING SCHEME IN DYNAMIC DELAY TOLERANT WDM TRANSPARENT NETWORKS

    Naama Amdouni, Laboratoire de Systemes de Communications, Tunisie and Taoufik Aguili, Institut Superieur d’Informatique du Kef, Tunisie
    ABSTRACT

    In this paper, we investigate further improvement in performance of dynamic Wavelength-Division Multiplexing (WDM) transparent delay tolerant networks with Quality of Transmission (QoT) constraints. Indeed, taking into account QoT constraints, wavelength integrity constraint and wave- length continuity constraint when solving the Routing and Wavelength Assignment (RWA) problem results in inefficient utilization of network resources and leads to higher rejection ratio. To mitigate the impact of these constraints, we propose to exploit traffic rerouting and set up delay tolerance. Set up delay tolerance is a measure of customer patience, and it is defined as the duration a connection request can be held until it is set up. Our proposed algorithm applies hybrid rerouting, which combines passive and active rerouting, and set up delay tolerance. Extensive numerical experiments show that traffic rerouting and set up delay tolerance flexibility in the traffic model provide significant improvements, either in terms of rejection ratio or in terms of service disruption period. Also, obtained results show that passive rerouting work slight better than hybrid rerouting.

  • PERFORMANCE EVALUATION AND IMPROVEMENT OF LIFTED RANK METRIC CODES IN RANDOM LINEAR NETWORK CODING

    Aicha Guefrachi, Sonia Zaibi and Ammar Bouallegue,Tunis el Manar University, Tunisia
    ABSTRACT

    In spite of the benefits of network coding, it is highly sensitive to errors propagation. Therefore, classical error correction codes are inadequate to solve the problem. Recently, lifted rank metric codes (LRMC) which are constructed from the lifting of rank metric codes as Gabidulin codes have been proposed for error control in random linear network coding. In this paper, we give a performance evaluation of such codes using NCS-EC simulator then we propose to further improve the performance, the use of a cyclic redundancy check (CRC) codes to prevent error propagation. LRMC with CRC give a better performance when conditional random linear network coding is used at intermediate nodes.

  • INTERNET OF THINGS IN INDUSTRY 4.0 CASE STUDY: FLUID DISTRIBUTION MONITORING SYSTEM

    Maroua Abdelhafidh1,2,3, Mohamed Fourati1,2,4, Lamia Chaari Fourati1,2,4 and Abdessalam Chouaya5, 1Laboratory of Technology and Smart Systems (LT2S), University of Sfax, Tunisia 2Digital Research Center of Sfax (CRNS) 3National Engineering School of Sfax, Tunisia 4Higher Institute of Computer Science and Multimedia of Sfax 5Research Center Gafsa Chemical Group (SIAPE), Gafsa, Tunisia
    ABSTRACT

    Internet of Things (IoT) is an emergent technology that provides a promising opportunity to improve industrial systems by the smartly use of physical objects, systems, platforms and applications that contain embedded technology to communicate and share intelligence with each other. In recent years, a great range of industrial IoT applications have been developed and deployed. Among these applications, the Water and Oil&Gas Distribution System is tremendously important considering the huge amount of fluid loss caused by leakages and other possible hydraulic failures. Accordingly, to design an accurate Fluid Distribution Monitoring System (FDMS) represents a critical task that imposes a serious study and an adequate planning. This paper reviews the current state-of-the-art of IoT, major IoT applications in industries and focus more on the Industrial IoT FDMS (IIoT FDMS).

  • AUTOMATIC DETECTION OF A NORMALIZED CHANNEL FOR FUTURE MOBILE 5G

    Maroua Abdelhafidh1,2,3, Mohamed Fourati1,2,4, 1Laboratory of Technology and Smart Systems (LT2S), University of Sfax, Tunisia 2Digital Research Center of Sfax (CRNS) 3National Engineering School of Sfax, Tunisia 4Higher Institute of Computer Science and Multimedia of Sfax
    ABSTRACT

    After generations of developments, wireless networks undergo a tremendous growth in order to provide smart communication techniques and reliable transmission data. Currently, the 5G technology for mobile communications is considered as a revolutionary solution able to provide a secure, fast and efficient wireless communication. Due to the permanent use of network services, this technology is obliged to deal with unexpected number of communications. To facilitate this task, the Software Defined Radio technology is used to support normalized channels with their operating conditions, frequencies and features allowing a flexible communication with the user. In this paper, to make this technology easy to understand, we propose a new intelligent algorithm based on learning phase to allow the user on the receiver side to identify automatically on which channel the information is forwarded. The detection rate value is used as an evaluation criterion to decide which channel is more detected and what conditions are more suitable for this detection.

  • CLOUD COMPUTING SYSTEMS: Infrastructure as a Service

    Mouna Jouini and Latifa Ben Arfa Rabai
    ABSTRACT

    Cloud Computing represents a new computing way that increases dynamically capabilities without investing new infrastructure. It become much adopted today thanks to many advantages like distributed computing, scalability and performance, multi-tenancy and pay per use services. However, it poses many serious security issues at all cloud delivery models. Software, Platform, and Infrastructure as a Service are the three main service delivery models for Cloud Computing. Infrastructure as a Service (IaaS) serves as the basis layer for the other delivery models, and a lack of security in this layer will affect the other delivery models. This paper presents a detailed study of IaaS components’ security and determines vulnerabilities and security solutions. Finally, to combat security repose, we present a security risk management framework for Cloud system to threats and vulnerabilities reduction security risks mitigation. The proposed security risk management framework is based on a quantitative security risk assessment model to evaluate risks for this system.

  • TOWARDS A COMMUNITY-BASED MOBILE NEARBY ASSISTANCE SOLUTION : FRAMEWORK AND FIRST PROTOTYPE

    Amine Boulemtafes1, Dalila Hamidouche2, Chayma Zatout2, Chafika Benzaid2 and Nadjib Badache1,2, 1CERIST Research center, Algiers, Algeria, 2USTHB University Algiers, Algeria
    ABSTRACT

    In some cases, being able to appeal to a nearby assistance could be a determining factor possibly saving lives. In fact, a person can at any time encounter a problem or a danger, such as getting lost, falling, having a cardiovascular accident, facing a danger of aggression or theft or having a road accident, which becomes more critical if the person is being far from the eyes. From this perspective, this work aims to study the design of an effective mobile solution focusing on community involvement, cost and reactivity factors -with the help of a set of today’s technologies in particular Smartphone, Cloud and sensors- allowing notifying users as well as competent services neighboring a person in need of help.

  • DETECTION AND PREVENTION OF BLACK HOLE ATTACK IN VANET USING SECURED AODV ROUTING PROTOCOL

    Salim Lachdhaf1, Mohammed Mazouzi2 and Mohamed Abid2, 1University of Gabes, Tunisia, 2University of Sfax, Tunisia
    ABSTRACT

    Vehicular ad hoc networks (VANETs) are becoming popular and promising technologies in the modern intelligent transportation world. They are used to provide an efficient Traffic Information System (TIS), Intelligent Transportation System (ITS), and Life Safety.

    The mobility of the nodes and the volatile nature of the connections in the network have made VANET vulnerable to many security threats. Black hole attack is one of the security threat in which node presents itself in such a way to the other nodes that it has the shortest and the freshest path to the destination.

    Hence in this research paper an efficient approach for the detection and removal of the Black hole attack in the Vehicular Ad Hoc Networks (VANET) is described. The proposed solution is implemented on AODV (Ad hoc On demand Distance Vector) Routing protocol one of the most popular routing protocol for VANET. The strategy can detect both the single Black hole attack and the Cooperative Black hole attack in the early phase of route discovery.

    The simulation is carried on NS2 and the results of the proposed scheme are compared to [14] and the fundamental AODV routing protocol, this results are examined on various network performance metrics such as packet delivery ratio, throughput and end-to-end delay. The found results show the efficacy of the proposed method as throughput and the delivery ratio of the network does not deteriorate in presence of the back holes.

  • COGNITIVE RADIO AND RADIO FREQUENCY IDENTIFICATION TECHNOLOGIES IN SMART ENVIRONMENT

    Roa Alharbi, University of Western Ontario, Canada
    ABSTRACT

    In this survey, smart environment wireless networks are reviewed. The focus is on using the Cognitive Radio (CR) technology and Radio Frequency Identification (RFID) technology in these smart networks. Therefore, the reviewed research papers are studying the Cognitive Radio usage in smart homes and hospitals wireless networks. The main objectives of using CR in wireless networks are providing the flexibility in networks allocation, managing wireless networks efficiently and saving time and cost for communications. In addition, the papers include how the Radio Frequency Identification technology is merged with the Cognitive Radio to produce a smart environment. Although new technologies like CR and RFID have advantages, they also have disadvantages such as network interferences, network allocation and users’ priorities management. For this reason, recent studies are describing the challenges that facing CR and RFID technologies and new ways to solve them.

  • A MULTILEVEL AUTHENTICATION PROTOCOL: MAP, IN VANETS FOR HUMAN SAFETY

    Nesrine Meddeb, Amel Meddeb-Makhlouf and Mohamed-Ali Ben Ayed, ENET’COM – NTS’COM Research Unit Technopole Sfax, Tunisia
    ABSTRACT

    Due to the real-time requirement of message in Vehicular Ad hoc NETworks (VANET), it is necessary to authenticate vehicles to achieve security, efficiency, and conditional privacy-preserving. Privacy is of utmost relevance in VANETs. For this reason, we have proposed a new protocol called “Multilevel Authentication Protocol” (MAP) that considers different vehicle categories. The proposed protocol is based on our Multilevel Authentication protocol for Vehicular networks (MAVnet). But the MAP is destined for the field of medicine, where the priority is given to the ambulance vehicles. For evaluation, we use the Java language to develop a demo application and deployed it on the Network Security Simulation (Nessi2). Compared with existing authentication protocols, MAP markedly enhance the communication overhead and decreases the delay of exchanging messages while preserving conditional privacy.


























Copyright © NeTCoM 2017