Academic & Scientific Articles
Permanent URI for this communityhttp://dl.cerist.dz/handle/CERIST/3
Browse
9 results
Search Results
Item DPFTT: Distributed Particle Filter for Target Tracking in the Internet of Things(IEEE, 2023-11-07) Boulkaboul, Sahar; Djenouri, Djamel; Bagaa, MiloudA novel distributed particle filter algorithm for target tracking is proposed in this paper. It uses new metrics and addresses the measurement uncertainty problem by adapting the particle filter to environmental changes and estimating the kinematic (motion-related) parameters of the target. The aim is to calculate the distance between the Gaussian-distributed probability densities of kinematic data and to generate the optimal distribution that maximizes the precision. The proposed data fusion method can be used in several smart environments and Internet of Things (IoT) applications that call for target tracking, such as smart building applications, security surveillance, smart healthcare, and intelligent transportation, to mention a few. The diverse estimation techniques were compared with the state-of-the-art solutions by measuring the estimation root mean square error in different settings under different conditions, including high-noise environments. The simulation results show that the proposed algorithm is scalable and outperforms the standard particle filter, the improved particle filter based on KLD, and the consensus-based particle filter algorithm.Item Multicast DIS attack mitigation in RPL-based IoT-LLNs(Elsevier, 2021-09) Medjek, Faiza; Tandjaoui, Djamel; Djedjig, Nabil; Romdhani, ImedThe IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was standardised by the IETF ROLL Working Group to address the routing issues in the Internet of Things (IoT) Low-Power and Lossy Networks (LLNs). RPL builds and maintains a Destination Oriented Directed Acyclic Graph (DODAG) topology using pieces of information propagated within the DODAG Information Object (DIO) control message. When a node intends to join the DODAG, it either waits for DIO or sends a DODAG Information Solicitation (DIS) control message Multicast to solicit DIOs from nearby nodes. Nevertheless, sending Multicast DIS messages resets the timer that regulates the transmission rate of DIOs to its minimum value, which leads to the network’s congestion with control messages. Because of the resource-constrained nature of RPL-LLNs, the lack of tamper resistance, and the security gaps of RPL, malicious nodes can exploit the Multicast DIS solicitation mechanism to trigger an RPL-specification-based attack, named DIS attack. The DIS attack can have severe consequences on RPL networks, especially on control packets overhead and power consumption. In this paper, we use the Cooja–Contiki simulator to assess the DIS attack’s effects on both static and dynamic PRL networks. Besides, we propose and implement a novel approach, namely RPL-MRC, to improve the RPL’s resilience against DIS Multicast. RPL-MRC aims to reduce the response to DIS Multicast messages. Simulation results demonstrate how the attack could damage the network performance by significantly increasing the control packets overhead and power consumption. On the other hand, the RPL-MRC proposed mechanism shows a significant enhancement in reducing the control overhead and power consumption for different scenarios.Item Revisiting Directed Diffusion In The Era Of IoT-WSNs : Power Control For Adaptation to High Density(IEEE Xplore, 2017-08-28) Khelladi, LyesWireless Sensor Networks (WSNs) have been recognized as a crucial and enabling technology in the world of Internet of Things (IoT). However, their integration with IoT arises new design challenges, compared to conventional WSNs applications. This paper addresses the challenge of high node density and its impact on the design of IoT-WSNs routing protocols. We propose a power-aware topology control mechanism built upon the prominent routing scheme, Directed Diffusion. Moreover, we take benefit from the power-awareness feature of the topology control mechanism in order to compute an energy consumption metric, allowing the selection of energy-efficient routes. The simulation results demonstrate an improvement by the proposed protocol in terms of energy efficiency, data reporting delays and delivery success rate.Item Collaborative KP-ABE for Cloud-Based Internet of Things Applications(IEEE, 2016-05-23) Touati, Lyes; Challal, YacineKP-ABE mechanism emerges as one of the most suitable security protocol for asymmetric encryption. It has been widely used to implement access control solutions. However, due to its expensive overhead, it is difficult to consider this protocol in resource-limited networks, such as the IoT. As the cloud has become a key infrastructural support for IoT applications, it is interesting to exploit cloud resources to perform heavy operations. In this paper, a collaborative variant of KP-ABE named C-KP-ABE for cloud-based IoT applications is proposed. Our proposal is based on the use of computing power and storage capacities of cloud servers and trusted assistant nodes to run heavy operations. A performance analysis is conducted to show the effectiveness of the proposed solution.Item Trust management in IoT routing protocol(CERIST, 2015-04-19) Djedjig, Nabil; Tandjaoui, Djamel; Medjek, FaizaThe Routing Protocol for Low-Power and Lossy Networks (RPL) is the routing protocol standardized for constrained environments such as 6LoWPAN networks, and is considered as the routing protocol of the Internet of Things (IoT). However, this protocol is subject to several internal and external attacks. In this paper, we investigate a trust management protocol in RPL. Our idea of trust management in RPL is to establish a dynamic trust relationship between the different nodes involved in routing. In fact, RPL organizes a logical representation of the network topology using control messages. In our proposed protocol, we strengthen RPL by adding a new trustworthiness metric during RPL construction and maintenance. This metric allows a node to decide whether or not to trust the other nodes during the construction of the topology.Item Evaluation of the impacts of Sybil attacks against RPL under mobility(CERIST, 2014-06) Medjek, Faiza; Tandjaoui, Djamel; Djedjig, NabilThe Routing Protocol for Low-Power and Lossy Networks (RPL) is the routing protocol standardized for constrained environments such as 6LoWPAN networks, and is considered as the routing protocol of the Internet of Things (IoT). However, this protocol is subject to several attacks that have been analyzed on static case. Nevertheless, IoT will likely present dynamic and mobile applications. In this paper, we introduce potential security threats on RPL, in particular Sybil attacks when the Sybil nodes are mobile. In addition, we present an analysis and a discussion on how network performances can be affected. Our analysis shows, under Sybil attacks while nodes are mobile, that the performances of RPL are highly affected compared to the static case. In fact, we notice a decrease in the rate of packet delivery, and an increase in control messages overhead. As a result, energy consumption at constrained nodes increases. Our proposed attacks demonstrate that Sybil mobile nodes can easily disrupt RPL and overload the network with fake messages making it unavailable. Based on the obtained results we provide some recommendations to tackle this issue.Item A Lightweight Key Management Scheme for E-health applications in the context of Internet of Things(CERIST, 2014-03-15) Abdmeziem, Riad; Tandjaoui, DjamelIn the context of Internet of Things where real world objects will automatically be part of the Internet, ehealth applications have emerged as a promising approach to provide unobtrusive support for elderly and frail people based on their situation and circumstances. However, due to the limited resource available in such systems and privacy concerns that might rise from the capture of personal data, security issues constitute a major obstacle to their deployment. Authentication of the different entities involved and data confidentiality constitute the main concerns for users that need to be addressed. In this paper, we propose a new key management scheme for an ehealth application to allow sensors and the Base Station (BS) to negotiate certain security credentials that will be used to protect the information flow. Our prtocol provides a strong level of security guaranteeing authentication and data confidentiality while the scarcity of resources is taken into consideration. The scheme is based on a lightweight Public Key Infrastructure (PKI) where the sensors have to perform only one Elliptic Curve Cryptography (ECC) decryption in the key establishment process. Data exchanges are then secured by the use of symmetric encryption. In addition, Time Stamps are used to prevent replay attacks along with Message Code Authentication (MAC) to ensure integrity.Item On the Relevance of Using Interference and Service Differentiation Routing in the Internet-of-Things(CERIST, 2013) Djenouri, Djamel; Bagula, Antoine; Karbab, ElmouatezbillahNext generation sensor networks are predicted to be deployed in the Internet-of-the-Things (IoT) with a high level of heterogeneity, using a model where the sensor motes will be equipped with different sensing and communication devices and tasked to deliver different services leading to different energy consumption patterns. The application of traditional wireless sensor routing algorithms designed for sensor motes expanding the same energy to such heterogeneous networks may lead to energy unbalance and subsequent short-lived sensor network resulting from routing the sensor readings over the most overworked sensor nodes while leaving the least used nodes idle. Building upon sensor devices service identification, this paper assess the relevance of using sensor node service differentiation to achieve efficient traffic engineering in IoT settings and its relative efficiency compared to traditional sensor routing. Performance evaluation with simulation reveals clear improvement of the proposed protocol vs. state of the art solutions in terms of load balancing, notably for critical nodes that cover more services. Results show that the proposed protocol considerably reduce the number of packets routed by critical nodes, where the difference with the compared protocol becomes more and more important as the number of nodes rises. Results also show clear reduction in the average energy consumption.Item On the Relevance of Using Interference and Service Differentiation Routing in the Internet-of-Things(Springer, 2013-08) Bagula, Antoine; Djenouri, Djamel; Karbab, ElmouatezbillahNext generation sensor networks are predicted to be deployed in the Internet-of-the-Things (IoT) with a high level of heterogeneity. They will be using sensor motes which are equipped with different sensing and communication devices and tasked to deliver different services leading to different energy consumption patterns. The application of traditional wireless sensor routing algorithms designed for sensor motes expanding the same energy to such heterogeneous networks may lead to energy unbalance and subsequent short-lived sensor networks resulting from routing the sensor readings over the most overworked sensor nodes while leaving the least used nodes idle. Building upon node interference awareness and sensor devices service identification, we assess the relevance of using a routing protocol that combines these two key features to achieve efficient traffic engineering in IoT settings and its relative efficiency compared to traditional sensor routing. Performance evaluation with simulation reveals clear improvement of the proposed protocol vs. state of the art solutions in terms of load balancing, notably for critical nodes that cover more services. Results show that the proposed protocol considerably reduce the number of packets routed by critical nodes, where the difference with the compared protocol becomes more and more important as the number of nodes increases. Results also reveal clear reduction in the average energy consumption.