Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Adnane Cabani is active.

Publication


Featured researches published by Adnane Cabani.


ieee international conference on green computing and communications | 2012

Improvement of Zigbee Routing Protocol

Mohamed Kasraoui; Adnane Cabani; Joseph Mouzna

ZigBee is a standard based on the IEEE 802.15.4 standard for wireless personal networks. Its use in Wireless Sensor Networks (WSNs) has aroused a great interest in the research community in the last years. In this paper, a synthetic study to analyze the performances and improve the routing protocols in WSNs is given and we were interested in routing mechanisms defined by the ZigBee standard. Multiple routing protocols have been developed to find optimized routes from a source to destination. ZigBee routing protocol uses a modified AODV by default and Hierarchical Tree Routing as last resort. The scope of this work is to improve the existing protocol to take the scalability into account and use it in tree topology in a variable network sizes up to hundreds of nodes. This paper describes the different routing protocols, our proposed solution ZBR-M and finally it presents and discusses the obtained results.


the internet of things | 2015

Collaborative key exchange system based on Chinese Remainder Theorem in heterogeneous wireless sensor networks

Mohamed Kasraoui; Adnane Cabani; Houcine Chafouk

IPv6 over Low Power Wireless Personal Area Networks (6LoWPANs), in the next generation of wireless sensor networks, represent an emerging field which can be integrated with Internet technology. Security is one of the most important issues in 6LoWPANs given the vulnerability to security threats from Internet and the inherent constraints such as bandwidth, processing power, memory, and energy. Despite limited resources, data security for nodes adds an additional heavy cost by using various security schemes. Moreover, there is no standard approach to provide the end-to-end security in 6LoWPANs. In this work, we first axed our research to propose a new end-to-end security scheme for IP enabled sensor networks to optimize battery energy consumption and then we adapted the Internet Key Exchange version 2 (IKEv2) to wireless sensor networks while taking into consideration the scarce resources. Hence a novel Cooperative Key Exchange System (CKES) has been proposed in this paper based on Chinese Remainder Theorem (CRT) which has also been implemented in NS2 to analyze energy consumption compared to IKEv2.


international symposium on computer consumer and control | 2014

IKEv2 Authentication Exchange Model in NS-2

Mohamed Kasraoui; Adnane Cabani; Houcine Chafouk

Wireless Sensor Network (WSN)communications has become one of the most emerging fields in the area of wireless communication technologies. Integration of WSN with internet technologies has been enhanced because of the use of 6LowPAN standard. This leads to the challenges and significance of end-to-end security in 6LoWPAN communication between IPv6 enabled sensor networks and the Internet hosts. Many researchers have proposed the use of IPsec/IKE to WSNs for reinforcing the end-to-end security communication. Till now IKE module have not been implemented or added in a network simulator. In the proposed paper we have implemented the IKE module in Network Simulator-2 (NS2) simulator. This new module will helps to study in detail about the end-to-end security in wireless communication. In this paper we have also discussed and compared the pros and cons of network simulators like OMNET++, TOSSIM and COOJA with NS2.


international symposium on computer consumer and control | 2014

Formal Verification of Wireless Sensor Key Exchange Protocol Using AVISPA

Mohamed Kasraoui; Adnane Cabani; Houcine Chafouk

For efficient deployment of sensor nodes required in many logistic applications, its necessary to build security mechanisms for a secure wireless communication. End-to-end security plays a crucial role for the communication in these networks. This provides the confidentiality, the authentication and mostly the prevention from many attacks at high level. In this paper, we propose a lightweight key exchange protocol WSKE (Wireless Sensor Key Exchange) for IP-based wireless sensor networks. This protocol proposes techniques that allows to adapt IKEv2 (Internet Key Exchange version 2) mechanisms of IPSEC/6LoWPAN networks. In order to check these security properties, we have used a formal verification tools called AVISPA.


ieee intelligent vehicles symposium | 2015

Intelligent navigation system-based optimization of the energy consumption

Adnane Cabani; Redouane Khemmar; Jean-Yves Ertaud; Joseph Mouzna

The aim of this work is to design and build by 2015 an electric four-seater equipped with an autonomous extension device. The project was born from two observations: in a context of necessary diversification of energy sources and the development of electric vehicles, the main problem remains the battery life and availability of charging stations. The issue of our work lies both in the optimization of energy consumption and improving the electric vehicle. Our team was tasked to develop and implement an Energy Management System of Electric Vehicle. The objective of the mission is to create a program that calculates the set speed to minimize the cost of energy consumption and maximize battery life. This calculation is done by taking into account prevention parameters are: vehicle speed, real-time parameters from Maps (elevations in the path, wind speed, etc.), the forces applied to the vehicle.


computer, information, and systems sciences, and engineering | 2010

Investigation and Implementation of T-DMB Protocol in NCTUns Simulator

Tatiana Zuyeva; Adnane Cabani; Joseph Mouzna

Investigation of T-DMB protocol forced us to create simulation model. NCTUns simulator which is open source software and allows addition of new protocols was chosen for implementation. This is one of the first steps of research process. Here we would like to give small overview of T-DMB (DAB) system, describe proposed simulation model and problems which we have met during the work.


systems, man and cybernetics | 2010

Comparison of error-correcting schemes in T-DMB and DAB systems

Tatiana Zuyeva; Joseph Mouzna; Adnane Cabani

Quality estimation of data transmission is a high priority goal of data transmission systems research. Estimation from the side of used error-correcting schemes efficiency can be one of the solutions. In this paper we would like to show the results of the comparison of error-correcting schemes in T-DMB and DAB protocols in conditions of data transmission between moving subscribers. These results are represented as a graph of dependence probability of error from Signal-to-Noise ratio and show the gain when using T-DMB for transmission of multimedia services in mobile channels. We show that using T-DMB for data transmission in the mobile channel can provide high quality transmission. NCTUns implementation model was used during this work.


IFAC-PapersOnLine | 2015

Simulating new logistics system of Le Havre Port

D. Leriche; M. Oudani; Adnane Cabani; G. Hoblos; Joseph Mouzna; Jaouad Boukachour; A. El Hilali Alaoui


International Journal of Computer Science & Applications | 2013

Zbr-M: A New Zigbee Routing Protocol.

Mohamed Kasraoui; Adnane Cabani; Joseph Mouzna


2016 3rd International Conference on Logistics Operations Management (GOL) | 2016

A simulation-optimisation study for comparison of new logistics systems at Le Havre Port

David Leriche; Mustapha Oudani; Adnane Cabani; Ghaleb Hoblos; Joseph Mouzna; Jaouad Boukachour; Ahmed El Hilali Alaoui

Collaboration


Dive into the Adnane Cabani's collaboration.

Top Co-Authors

Avatar

Joseph Mouzna

Systems Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tatiana Zuyeva

Saint Petersburg State University of Aerospace Instrumentation

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jean-Yves Ertaud

Systems Research Institute

View shared research outputs
Top Co-Authors

Avatar

Redouane Khemmar

Systems Research Institute

View shared research outputs
Top Co-Authors

Avatar

A. El Hilali Alaoui

Sidi Mohamed Ben Abdellah University

View shared research outputs
Top Co-Authors

Avatar

Ahmed El Hilali Alaoui

Sidi Mohamed Ben Abdellah University

View shared research outputs
Top Co-Authors

Avatar

M. Oudani

Sidi Mohamed Ben Abdellah University

View shared research outputs
Researchain Logo
Decentralizing Knowledge