International Journal Papers

Permanent URI for this collectionhttp://dl.cerist.dz/handle/CERIST/17

Browse

Search Results

Now showing 1 - 3 of 3
  • Thumbnail Image
    Item
    Game Theory Framework for MAC Parameter Optimization in Energy-Delay Constrained Sensor Networks
    (ACM, 2016-05-15) Doudou, Messaoud; M. Barcelo-Ordinas, Jose; Djenouri, Djamel; Garcia-Vidal, Jorge; Bouabdallah, Abdelmadjid; Badache, Nadjib
    Optimizing energy consumption and end-to-end (e2e) packet delay in energy-constrained, delay-sensitive wireless sensor networks is a conflicting multi-objective optimization problem. We investigate the problem from a game theory perspective, where the two optimization objectives are considered as game players. The cost model of each player is mapped through a generalized optimization framework onto protocol specific MAC parameters. From the optimization framework, a game is first defined by the Nash Bargaining Solution (NBS) to assure energy-consumption and e2e delay balancing. Secondly, the Kalai-Smorodinsky Bargaining Solution (KSBS) is used to find equal proportion of gain between players. Both methods offer a bargaining solution to the duty-cycle MAC protocol under different axioms. As a result, given the two performance requirements, i.e., the maximum latency tolerated by the application and the initial energy budget of nodes, the proposed framework allows to set tunable system parameters to reach a fair equilibrium point which dually minimizes the system latency and energy consumption. For illustration, this formulation is applied to six state-of-the-art Wireless Sensor Network (WSN) MAC protocols; B-MAC, X-MAC, RI-MAC, SMAC, DMAC, and LMAC. The paper shows the effectiveness and scalability of such framework in optimizing protocol parameters that achieve a fair energy-delay performance trade-off under the application requirements.
  • Thumbnail Image
    Item
    Gestion de clés et sécurité multipoint: étude et perspectives
    (Springer-Verlag, 2003) Seba, Hamida; Bouabdallah, Abdelmadjid; Badache, Nadjib; Bettahar, Hatem; Tandjaoui, Djamel
    La communication multipoint (ou communication de groupe) est un moyen efficace pour envoyer des données aux membres d’un groupe. Plusieurs types d’applications utilisant les communications multipoint nécessitent un certain niveau de sécurité: authentification, intégrité, confidentialité et contrôle d’accès. Comme les techniques implémentant ces services dans les communications point-à-point ne peuvent être appliquées telles quelles aux communications de groupe, la sécurité des communications de groupe a fait l’objet de plusieurs travaux. La gestion de clés qui constitue la brique de base des services de sécurité a été largement étudiée et a donné lieu à plusieurs publications. Dans cet article, nous décrivons les différentes approches existantes pour gérer et distribuer les clés dans un groupe. Nous discutons les avantages et les inconvénients des protocoles proposés dans la littérature et présentons une classification et une étude comparative de ces protocoles. Nous terminons cet article par quelques critiques et perspectives.
  • Thumbnail Image
    Item
    Synchronous Contention-Based MAC Protocols for Delay-Sensitive Wireless Sensor Networks: A Review and Taxonomy
    (2013-04-06) Doudou, Messaoud; Djenouri, Djamel; Badache, Nadjib; Bouabdallah, Abdelmadjid
    Duty cycling allows obtaining significant energy saving compared to full duty cycle (sleepless) random access MAC protocols. However, it may result in significant latency. In slotted duty-cycled medium access control (MAC) protocols, sensor nodes periodically and synchronously alternate their operations between active and sleep modes. The sleep mode allows a sensor node to completely turn off its radio and save energy. In order to transmit data from one node to another, both nodes must be in active mode. The synchronous feature makes the protocols more appropriate for delay-sensitive applications compared to asynchronous protocols. The latter involve additional delay for the sender to meet the receiver's active period, which is eliminated with synchronous approach where nodes sleep and wake up all together. Despite the possible increase of contention by grouping active periods, the delay due to packets retransmissions after collisions is less significant compared to the waiting time of asynchronous protocols. Furthermore, contention-based feature makes the protocol conceptually distributed and more dynamic compared to TDMA-based. This manuscript deals with timeliness issues of slotted contention-based WSN MAC protocols. It provides a comprehensive review and taxonomy of state-of-the-art synchronous MAC protocols. The performance objective considered in the proposed taxonomy is the latency, in the context of energy-limited WSN, where energy is considered as a constraint for the MAC protocol that yields the need of duty-cycling the radio. The main contribution is to study and classify these protocols from the delay efficiency perspective. The protocols are divided into two main categories: static schedule and adaptive schedule. Adaptive schedule are split up into four subclasses: adaptive grouped schedule, adaptive repeated schedule, staggered schedule, and reservation schedule. Several state-of-the-art protocols are described following the proposed classification, with comprehensive discussions and comparisons with respect to their latency.