Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Abdelraouf Ouadjaout is active.

Publication


Featured researches published by Abdelraouf Ouadjaout.


Journal of Network and Computer Applications | 2011

Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks

Yacine Challal; Abdelraouf Ouadjaout; Mouloud Bagaa; Abdelkrim Hadjidj

In wireless sensor networks, reliability is a design goal of a primary concern. To build a comprehensive reliable system, it is essential to consider node failures and intruder attacks as unavoidable phenomena. In this paper, we present a new intrusion-fault tolerant routing scheme offering a high level of reliability through a secure multipath routing construction. Unlike existing intrusion-fault tolerant solutions, our protocol is based on a distributed and in-network verification scheme, which does not require any referring to the base station. Furthermore, it employs a new multipath selection scheme seeking to enhance the tolerance of the network and conserve the energy of sensors. Extensive analysis and simulations using TinyOS showed that our approach improves many important performance metrics such as: the mean time to failure of the network, detection overhead of some security attacks, energy consumption, and resilience.


international conference on computer communications | 2012

Semi-structured and unstructured data aggregation scheduling in wireless sensor networks

Miloud Bagaa; Abdelouahid Derhab; Abdelraouf Ouadjaout; Nadjib Badache

This paper focuses on data aggregation scheduling problem in wireless sensor networks (WSNs), to minimize time latency. Prior works on this problem have adopted a structured approach, in which a tree-based structure is used as an input for the scheduling algorithm. As the scheduling performance mainly depends on the supplied aggregation tree, such an approach cannot guarantee optimal performance. To address this problem, we propose approaches based on Semi-structured Topology (DAS-ST) and Unstructured Topology (DAS-UT). The approaches are based on two key design features, which are: (1) simultaneous execution of aggregation tree construction and scheduling, and (2) parent selection criteria that maximize the choices of parents for each node and maximize time slot reuse. We prove that the latency of DAS-ST is upper-bounded by ([2π/arccos(1/1+ϵ)]+4)R+Δ-4, where R is the network radius, Δ is the maximum node degree, and 0.05 <; ϵ ≤ 1. Simulations results show that DAS-UT outperforms DAS-ST and four competitive state-of-the-art aggregation scheduling algorithms in terms of latency and network lifetime.


local computer networks | 2007

SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks

Miloud Bagaa; Abdelraouf Ouadjaout; Yacine Challal

Energy is a scarce resource in Wireless Sensor Networks. Some studies show that more than 70% of energy is consumed in data transmission. Since most of the time, the sensed information is redundant due to geographically collocated sensors, most of this energy can be saved through data aggregation. Furthermore, data aggregation improves bandwidth usage. Unfortunately, while aggregation eliminates redundancy, it makes data integrity verification more complicated since the received data is unique. In this paper, we present a new protocol that provides secure aggregation for wireless sensor networks. Our protocol is based on a two hops verification mechanism of data integrity. Our solution is essentially different from existing solutions in that it does not require referring to the base station for verifying and detecting faulty aggregated readings, thus providing a totally distributed scheme to guarantee data integrity. We carried out simulations using TinyOS environment. Simulation results show that the proposed protocol yields significant savings in energy consumption while preserving data integrity.


Journal of Parallel and Distributed Computing | 2012

Efficient data aggregation with in-network integrity control for WSN

Miloud Bagaa; Yacine Challal; Abdelraouf Ouadjaout; Nadjib Badache

Energy is a scarce resource in Wireless Sensor Networks (WSN). Some studies show that more than 70% of energy is consumed in data transmission in WSN. Since most of the time, the sensed information is redundant due to geographically collocated sensors, most of this energy can be saved through data aggregation. Furthermore, data aggregation improves bandwidth usage and reduces collisions due to interference. Unfortunately, while aggregation eliminates redundancy, it makes data integrity verification more complicated since the received data is unique. In this paper, we present a new protocol that provides control integrity for aggregation in wireless sensor networks. Our protocol is based on a two-hop verification mechanism of data integrity. Our solution is essentially different from existing solutions in that it does not require referring to the base station for verifying and detecting faulty aggregated readings, thus providing a totally distributed scheme to guarantee data integrity. We carried out numerical analysis and simulations using the TinyOS environment. Results show that the proposed protocol yields significant savings in energy consumption while preserving data integrity, and outperforms comparable solutions with respect to some important performance criteria.


availability, reliability and security | 2008

SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks

Abdelraouf Ouadjaout; Yacine Challal; Mouloud Bagaa

In wireless sensor networks, reliability represents a design goal of a primary concern. To build a comprehensive reliable system, it is essential to consider node failures and intruder attacks as unavoidable phenomena. In this paper, we present a new intrusion-fault tolerant routing scheme offering a high level of reliability through a secure multi-path communication topology. Unlike existing intrusion-fault tolerant solutions, our protocol is based on a distributed and in-network verification scheme, which does not require any referring to the base station. Furthermore, it employs a new multi-path selection scheme seeking to enhance the tolerance of the network and conserve the energy of sensors. Extensive simulations with Tiny OS showed that our approach improves the overall Mean Time To Failure (MTTF) while conserving the energy resources of sensors.


IEEE Transactions on Computers | 2015

An Effective Area-Based Localization Algorithm for Wireless Networks

Mohamed Younis; Abdelraouf Ouadjaout; Nadjib Badache

Area-based localization algorithms use only the position of some reference nodes, called anchors, to estimate the residence area of the remaining nodes. Existing algorithms use a triangle, a ring or a circle as the geometric shape that defines the nodes residence area. However, existing algorithms suffer from two major problems: (1) in some cases, they might make wrong decisions about a node presence inside a given area, or (2) they require high anchor density to achieve a low location estimation error and high ratio of localizable nodes. In this paper, we overcome these shortcomings by introducing a new approach for determining the nodes residence area that is geometrically shaped as a half-symmetric lens. A novel half symmetric lens based localization algorithm (HSL) is proposed. HSL yields smaller residence areas, and consequently, better location accuracy than contemporary schemes. HSL further employs Voronoi diagram in order to boost the percentage of localizable nodes. The performance of HSL is validated through mathematical analysis, extensive simulations experiments and prototype implementation. The validation results confirm that HSL achieves better location accuracy and higher ratio of localizable nodes compared to competing algorithms.


Computer Communications | 2017

REFIACC: Reliable, efficient, fair and interference-aware congestion control protocol for wireless sensor networks

Mohamed Amine Kafi; Jalel Ben-Othman; Abdelraouf Ouadjaout; Miloud Bagaa; Nadjib Badache

Abstract The recent wireless sensor network applications are resource greedy in terms of throughput and network reliability. However, the wireless shared medium leads to links interferences in addition to wireless losses due to the harsh environment. The effect of these two points translates on differences in links bandwidth capacities, lack of reliability and throughput degradation. In this study, we tackle the problem of throughput maximization by proposing an efficient congestion control-based schedule algorithm, dubbed REFIACC (Reliable, Efficient, Fair and Interference-Aware Congestion Control) protocol. REFIACC prevents the interferences and ensures a high fairness of bandwidth utilization among sensor nodes by scheduling the communications. The congestion and the interference in inter and intra paths hot spots are mitigated through tacking into account the dissimilarity between links’ capacities at the scheduling process. Linear programming is used to reach optimum utilization efficiency of the maximum available bandwidth. REFIACC has been evaluated by simulation and compared with two pertinent works. The results show that the proposed solution outperforms the others in terms of throughput and reception ratio (more than 80%) and can scale for large networks.


Procedia Computer Science | 2014

DZ50: Energy-efficient Wireless Sensor Mote Platform for Low Data Rate Applications☆

Abdelraouf Ouadjaout; Miloud Bagaa; Messaoud Doudou; Cherif Zizoua; Mohamed Amine Kafi; Abdleouahid Derhab; Djamel Djenouri; Nadjib Badache

Abstract A low cost and energy e_cient wireless sensor mote platform for low data rate monitoring applications is presented. The new platform, named DZ50, is based on the ATmega328P micro-controller and the RFM12b transceiver, which consume very low energy in low-power mode. Considerable energy saving can be achieved by reducing the power consumption during inactive (sleep) mode, notably in low data rate applications featured by long inactive periods. Without loss of generality, spot monitoring in a Smart Parking System (SPS) and soil moisture in a Precision Irrigation System (PIS) are selected as typical representative of low data rate applications. The performance of the new platform is investigated for typical scenarios of the selected applications and compared with that of MicaZ and TelosB. Energy measurements have been carried out for di_erent network operation states and settings, where the results reveal that the proposed platform allows to multiply the battery lifetime up to 7 times compared to MicaZ and TelosB motes in 10s sampling period scenarios.


international conference on communications | 2013

Efficient multi-path data aggregation scheduling in wireless sensor networks

Miloud Bagaa; Mohamed F. Younis; Abdelraouf Ouadjaout; Nadjib Badache

In wireless sensor networks, in-network data aggregation filters out redundant sensor readings in order to reduce the energy and bandwidth consumed in disseminating the data to the base-station. In this paper, we investigate the problem of reliable collection of aggregated data with minimal latency. The aim is to form an aggregation tree such that there are k disjoint paths from each node to the base-station and find a collision-free schedule for node transmissions so that the aggregated data reaches the base-station in minimal time. We propose a novel algorithm for Reliable and Timely dissemination of Aggregated Data (RTAD). RTAD intertwines the formation of the aggregation tree and the allocation of time slots to nodes, and assigns parents to the individual nodes in order to maximize time slot reuse. The simulation results show that RTAD outperforms competing algorithms in the literature.


Journal of Systems and Software | 2016

Static analysis by abstract interpretation of functional properties of device drivers in TinyOS

Abdelraouf Ouadjaout; Antoine Miné; Nadjib Badache

We present an effective static analysis of device drivers in TinyOS.We focus on verifying the correctness of the software/hardware interactions.We consider a preemptive execution model with possibly nested interrupts.The analysis is based on Abstract Interpretation and is sound by construction.We present several experimental results performed on real-world TinyOS programs. In this paper, we present a static analysis by Abstract Interpretation of device drivers developed in the TinyOS operating system, which is considered as the de facto system in wireless sensor networks. We focus on verifying user-defined functional properties describing safety rules that programs should obey in order to interact correctly with the hardware. Our analysis is sound by construction and can prove that all possible execution paths follow the correct interaction patterns specified by the functional property. The soundness of the analysis is justified with respect to a preemptive execution model where interrupts can occur during execution depending on the configuration of specific hardware registers. The proposed solution performs a modular analysis that analyzes every interrupt independently and aggregates their results to over-approximate the effect of preemption. By doing so, we avoid reanalyzing interrupts in every context where they are enabled which improves considerably the scalability of the solution. A number of partitioning techniques are also presented in order to track precisely some crucial information, such as the hardware state and the tasks queue. We have performed several experiments on real-world TinyOS device drivers of the ATmega128 MCU and promising results demonstrate the effectiveness of our analysis.

Collaboration


Dive into the Abdelraouf Ouadjaout's collaboration.

Top Co-Authors

Avatar

Nadjib Badache

University of Science and Technology Houari Boumediene

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yacine Challal

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mohamed Amine Kafi

University of Science and Technology Houari Boumediene

View shared research outputs
Top Co-Authors

Avatar

Djamel Djenouri

Norwegian University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Messaoud Doudou

University of Science and Technology Houari Boumediene

View shared research outputs
Top Co-Authors

Avatar

Mohamed Younis

University of Science and Technology Houari Boumediene

View shared research outputs
Researchain Logo
Decentralizing Knowledge