International Conference Papers
Permanent URI for this collectionhttp://dl.cerist.dz/handle/CERIST/4
Browse
3 results
Search Results
Item IoT-DMCP: An IoT data management and control platform for smart cities(SCITEPRESS – Science and Technology Publications, 2019) Boulkaboul, Sahar; Djenouri, Djamel; Bouhafs, Sadmi; Belaid, MohandThis paper presents a design and implementation of a data management platform to monitor and control smart objects in the Internet of Things (IoT). This is through IPv4/IPv6, and by combining IoT specific features and protocols such as CoAP, HTTP and WebSocket. The platform allows anomaly detection in IoT devices and real-time error reporting mechanisms. Moreover, the platform is designed as a standalone application, which targets at extending cloud connectivity to the edge of the network with fog computing. It extensively uses the features and entities provided by the Capillary Networks with a micro-services based architecture linked via a large set of REST APIs, which allows developing applications independently of the heterogeneous devices. The platform addresses the challenges in terms of connectivity, reliability, security and mobility of the Internet of Things through IPv6. The implementation of the platform is evaluated in a smart home scenario and tested via numeric results. The results show low latency, at the order of few ten of milliseconds, for building control over the implemented mobile application, which confirm realtime feature of the proposed solution.Item An Adaptive Anonymous Authentication for Cloud Environment(IEEE Xplore Digital labrary, 2015-06-02) Djellalbia, Amina; Benmeziane, Souad; Badache, Nadjib; Bensimessaoud, SihemPreserving identity privacy is a significant challenge for the security in cloud services. Indeed, an important barrier to the adoption of cloud services is user fear of privacy loss in the cloud. One interesting issue from a privacy perspective is to hide user’s usage behavior or meta-information which includes access patterns and frequencies when accessing services. Users may not want the cloud provider to learn which resources they access and how often they use a service by making them anonymous. In this paper, we will propose an adaptive and flexible approach to protect the identity privacy through an anonymous authentication scheme.Item A New Low Cost Sessions-Based Misbehaviour Detection Protocol (SMDP) for MANE(IEEE Computer Society, 2007-05) Djenouri, Djamel; Fahad, Tarek; Askwith, Robert; Merabti, MadjidThere is a strong motivation for a node to deny packet forwarding to others and being selfish in MANET. Recently, some solutions have been proposed, but almost all of these solutions rely on the watchdog technique, which suffers from many drawbacks, particularly when using the power control technique. To overcome this problem with a moderate communication overhead, this paper introduces a new approach for detecting misbehaving nodes that drop data packets in MANET. It consists of two stages: (i) the monitoring stage in which each node monitors its direct neighbours with respect to forwarding data packets of a traffic session in the network, and (ii) the decision stage, in which direct neighbouring nodes decide whether the monitored node misbehaves or not. Our new approach is able to detect the misbehaviour in case of power control employment, with a low communication overhead compared to the existing approaches.