Adnane Cabani
Systems Research Institute
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Adnane Cabani.
ieee international conference on green computing and communications | 2012
Mohamed Kasraoui; Adnane Cabani; Joseph Mouzna
ZigBee is a standard based on the IEEE 802.15.4 standard for wireless personal networks. Its use in Wireless Sensor Networks (WSNs) has aroused a great interest in the research community in the last years. In this paper, a synthetic study to analyze the performances and improve the routing protocols in WSNs is given and we were interested in routing mechanisms defined by the ZigBee standard. Multiple routing protocols have been developed to find optimized routes from a source to destination. ZigBee routing protocol uses a modified AODV by default and Hierarchical Tree Routing as last resort. The scope of this work is to improve the existing protocol to take the scalability into account and use it in tree topology in a variable network sizes up to hundreds of nodes. This paper describes the different routing protocols, our proposed solution ZBR-M and finally it presents and discusses the obtained results.
the internet of things | 2015
Mohamed Kasraoui; Adnane Cabani; Houcine Chafouk
IPv6 over Low Power Wireless Personal Area Networks (6LoWPANs), in the next generation of wireless sensor networks, represent an emerging field which can be integrated with Internet technology. Security is one of the most important issues in 6LoWPANs given the vulnerability to security threats from Internet and the inherent constraints such as bandwidth, processing power, memory, and energy. Despite limited resources, data security for nodes adds an additional heavy cost by using various security schemes. Moreover, there is no standard approach to provide the end-to-end security in 6LoWPANs. In this work, we first axed our research to propose a new end-to-end security scheme for IP enabled sensor networks to optimize battery energy consumption and then we adapted the Internet Key Exchange version 2 (IKEv2) to wireless sensor networks while taking into consideration the scarce resources. Hence a novel Cooperative Key Exchange System (CKES) has been proposed in this paper based on Chinese Remainder Theorem (CRT) which has also been implemented in NS2 to analyze energy consumption compared to IKEv2.
international symposium on computer consumer and control | 2014
Mohamed Kasraoui; Adnane Cabani; Houcine Chafouk
Wireless Sensor Network (WSN)communications has become one of the most emerging fields in the area of wireless communication technologies. Integration of WSN with internet technologies has been enhanced because of the use of 6LowPAN standard. This leads to the challenges and significance of end-to-end security in 6LoWPAN communication between IPv6 enabled sensor networks and the Internet hosts. Many researchers have proposed the use of IPsec/IKE to WSNs for reinforcing the end-to-end security communication. Till now IKE module have not been implemented or added in a network simulator. In the proposed paper we have implemented the IKE module in Network Simulator-2 (NS2) simulator. This new module will helps to study in detail about the end-to-end security in wireless communication. In this paper we have also discussed and compared the pros and cons of network simulators like OMNET++, TOSSIM and COOJA with NS2.
international symposium on computer consumer and control | 2014
Mohamed Kasraoui; Adnane Cabani; Houcine Chafouk
For efficient deployment of sensor nodes required in many logistic applications, its necessary to build security mechanisms for a secure wireless communication. End-to-end security plays a crucial role for the communication in these networks. This provides the confidentiality, the authentication and mostly the prevention from many attacks at high level. In this paper, we propose a lightweight key exchange protocol WSKE (Wireless Sensor Key Exchange) for IP-based wireless sensor networks. This protocol proposes techniques that allows to adapt IKEv2 (Internet Key Exchange version 2) mechanisms of IPSEC/6LoWPAN networks. In order to check these security properties, we have used a formal verification tools called AVISPA.
ieee intelligent vehicles symposium | 2015
Adnane Cabani; Redouane Khemmar; Jean-Yves Ertaud; Joseph Mouzna
The aim of this work is to design and build by 2015 an electric four-seater equipped with an autonomous extension device. The project was born from two observations: in a context of necessary diversification of energy sources and the development of electric vehicles, the main problem remains the battery life and availability of charging stations. The issue of our work lies both in the optimization of energy consumption and improving the electric vehicle. Our team was tasked to develop and implement an Energy Management System of Electric Vehicle. The objective of the mission is to create a program that calculates the set speed to minimize the cost of energy consumption and maximize battery life. This calculation is done by taking into account prevention parameters are: vehicle speed, real-time parameters from Maps (elevations in the path, wind speed, etc.), the forces applied to the vehicle.
computer, information, and systems sciences, and engineering | 2010
Tatiana Zuyeva; Adnane Cabani; Joseph Mouzna
Investigation of T-DMB protocol forced us to create simulation model. NCTUns simulator which is open source software and allows addition of new protocols was chosen for implementation. This is one of the first steps of research process. Here we would like to give small overview of T-DMB (DAB) system, describe proposed simulation model and problems which we have met during the work.
systems, man and cybernetics | 2010
Tatiana Zuyeva; Joseph Mouzna; Adnane Cabani
Quality estimation of data transmission is a high priority goal of data transmission systems research. Estimation from the side of used error-correcting schemes efficiency can be one of the solutions. In this paper we would like to show the results of the comparison of error-correcting schemes in T-DMB and DAB protocols in conditions of data transmission between moving subscribers. These results are represented as a graph of dependence probability of error from Signal-to-Noise ratio and show the gain when using T-DMB for transmission of multimedia services in mobile channels. We show that using T-DMB for data transmission in the mobile channel can provide high quality transmission. NCTUns implementation model was used during this work.
IFAC-PapersOnLine | 2015
D. Leriche; M. Oudani; Adnane Cabani; G. Hoblos; Joseph Mouzna; Jaouad Boukachour; A. El Hilali Alaoui
International Journal of Computer Science & Applications | 2013
Mohamed Kasraoui; Adnane Cabani; Joseph Mouzna
2016 3rd International Conference on Logistics Operations Management (GOL) | 2016
David Leriche; Mustapha Oudani; Adnane Cabani; Ghaleb Hoblos; Joseph Mouzna; Jaouad Boukachour; Ahmed El Hilali Alaoui
Collaboration
Dive into the Adnane Cabani's collaboration.
Saint Petersburg State University of Aerospace Instrumentation
View shared research outputs