Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Brahim Bensaou is active.

Publication


Featured researches published by Brahim Bensaou.


IEEE Journal on Selected Areas in Communications | 2004

Performance analysis of IEEE 802.11e contention-based channel access

Zhen Ning Kong; Danny H. K. Tsang; Brahim Bensaou; Deyun Gao

The new standard IEEE 802.11e is specified to support quality-of-service in wireless local area networks. A comprehensive study of the performance of enhanced distributed channel access (EDCA), the fundamental medium access control mechanism in IEEE 802.11e, is reported in this paper. We present our development of an analytical model, in which most new features of the EDCA such as virtual collision, different arbitration interframe space (AIFS), and different contention window are taken into account. Based on the model, we analyze the throughput performance of differentiated service traffic and propose a recursive method capable of calculating the mean access delay. Service differentiation functionality and effectiveness of the EDCA are investigated through extensive numerical and simulation results. The model and the analysis provide an in-depth understanding and insights into the protocol and the effects of different parameters on the performance.


international conference on computer communications | 2004

Fair bandwidth sharing algorithms based on game theory frameworks for wireless ad-hoc networks

Zuyuan Fang; Brahim Bensaou

This paper examines the theoretical aspects of bandwidth sharing in wireless, possibly mobile, ad-hoc networks (MANETs) through a game theoretic framework. It presents some applications to show how such a framework can be invoked to design efficient media access control protocols in a noncooperative, self-organized, topology-blind environment as well as in environments where the competing nodes share some basic information to guide their choice of channel access policies. For this purpose, contentions between concurrent links in a MANET are represented by a conflict graph, and each maximal clique in the graph defines a contention context which in turn imposes a constraint on the share of bandwidth that the links in the clique can obtain. Using this approach the fair bandwidth allocation problem is modeled as a general utility based constrained maximization problem, called the system problem, which is shown to admit a unique solution that can only be obtained when global coordination between all links is possible. By using Lagrange relaxation and duality theory, both a non-cooperative and a cooperative game formulation of the problem are derived. The corresponding mathematical algorithms to solve the two games are also provided where there is no need for global information. Implementation issues of the algorithms are also considered. Finally, simulation results are presented to illustrate the effectiveness of the algorithms.


IEEE Communications Magazine | 2008

Detecting and avoiding wormhole attacks in wireless ad hoc networks

Farid Naït-Abdesselam; Brahim Bensaou; Tarik Taleb

A particularly severe attack on routing protocols in ad hoc networks is the so-called worm- hole attack in which two or more colluding attackers record packets at one location, and tunnel them to another location for replay at that remote location. When this attack targets specifically routing control packets, the nodes that are close to the attackers are shielded from any alternative routes with more than one or two hops to the remote location. All routes are thus directed to the wormhole established by the attackers. In the optimized link state routing protocol, if a wormhole attack is launched during the propagation of link state packets, the wrong link information percolates throughout the network, leading to routing disruption. In this article we devise an efficient method to detect and avoid wormhole attacks in the OLSR protocOLSR protocolol. This method first attempts to pinpoint links that may potentially be part of a wormhole tunnel. Then a proper wormhole detection mechanism is applied to suspicious links by means of an exchange of encrypted probing packets between the two supposed neighbors (endpoints of the wormhole). The proposed solution exhibits several advantages, among which are its nonreliance on any time synchronization or location information, and its high detection rate under various scenarios.


vehicular technology conference | 2000

Adaptive quality of service handoff priority scheme for mobile multimedia networks

W. Zhuang; Brahim Bensaou; Kee Chaing Chua

For various advantages including better utilization of radio spectrum (through frequency reuse), lower mobile transmit power requirements, and smaller and cheaper base station equipment, future wireless mobile multimedia networks are likely to adopt micro/picocellular architectures. A consequence of using small cell sizes is the increased rate of call handoffs as mobiles move between cells during the holding times of calls. In a network supporting multimedia services, the increased rate of call handoffs not only increases the signaling load on the network, but makes it very difficult for the network to guarantee the quality of service (QoS) promised to a call at setup or admission time. This paper describes an adaptive QoS handoff priority scheme which reduces the probability of call handoff failures in a mobile multimedia network with a micro/picocellular architecture. The scheme exploits the ability of most multimedia traffic types to adapt and trade off QoS with changes in the amount of bandwidth used. In this way, calls can trade QoS received for fewer handoff failures. The call level and packet level performance of the handoff scheme are studied analytically for a homogeneous network supporting a mix of wide-band and narrow-band calls. Comparisons are made to the performance of the nonpriority handoff scheme and the well-known guard-channel handoff scheme.


ieee international conference computer and communications | 2007

Tradeoff Between Lifetime and Rate Allocation in Wireless Sensor Networks: A Cross Layer Approach

Junhua Zhu; Shan Chen; Brahim Bensaou; Ka-Lok Hung

This paper studies the tradeoff between energy consumption and application performance in wireless sensor networks by investigating the interaction between network lifetime maximization and rate allocation problems. To guarantee the individual performance of sensor nodes, we adopt the network utility maximization (NUM) framework to ensure certain fairness on source rates of sensor nodes. We formulate the network lifetime maximization problem and fair rate allocation problem as constrained maximization problems, and combine them by introducing a system parameter, which characterizes the tradeoff between the two problems. Using Lagrange dual decomposition, the original problem is vertically decomposed into three subproblems: a rate control problem at the transport layer, a contention resolution problem at the MAC Layer, and a cross-layer energy conservation problem. The first and second subproblems jointly solve the congestion problem in sensor networks via congestion prices, and fully distributed algorithms are derived. Furthermore, they are coupled with the cross layer energy conservation problem to solve the network lifetime maximization problem via energy prices. For the third subproblem, we first propose a partially distributed algorithm where network lifetime is a global information, and then by exploring the similarity between max-min rate allocation and network lifetime maximization in sensor networks, we approximate the latter by the NUM framework, and hence formulate the tradeoff problem in the unified NUM framework. As a result, a fully distributed algorithm is derived for the energy conservation problem.


IEEE ACM Transactions on Networking | 1997

Estimation of the cell loss ratio in ATM networks with a fuzzy system and application to measurement-based call admission control

Brahim Bensaou; Shirley T. C. Lam; Hon-Wai Chu; Danny H. K. Tsang

An important parameter in asynchronous transfer model (ATM)-based network design and management is the cell loss ratio (CLR) in ATM multiplexers. It is a key parameter to many vital functions in the network such as call admission control (CAC), bandwidth allocation, etc. However, the CLR depends usually on many unknown and unpredictable traffic parameters such as input traffic correlations. In this paper, we propose a simple and robust fuzzy-based algorithm to predict the CLR in large-sized systems based on both a small amount of information from small-sized systems, and the asymptotic behavior for very large systems. Unlike the model-based approaches, our approximation avoids the problem of assuming any traffic parameters or arrival process. This algorithm is used with real-time traffic measurement to propose an effective measurement-based call admission control framework for ATM networks.


IEEE ACM Transactions on Networking | 2001

Credit-based fair queueing (CBFQ): a simple service-scheduling algorithm for packet-switched networks

Brahim Bensaou; Danny H. K. Tsang; King Tung Chan

This paper proposes a simple rate-based scheduling algorithm for packet-switched networks. Using a set of counters to keep track of the credits accumulated by each traffic flow, the bandwidth share allocated to each flow, and the size of the head-of-line (HOL) packets of the different flows, the algorithm decides which flow to serve next. Our proposed algorithm requires on average a smaller complexity than the most interesting alternative ones while guaranteeing comparable fairness, delay, and delay jitter bounds. To further reduce the complexity, a simplified version (CBFQ-F) of the general algorithm is also proposed for networks with fixed packet lengths, such as ATM, by relaxing the fairness bound by a negligibly small amount.


acm special interest group on data communication | 2013

Intra-AS cooperative caching for content-centric networks

Jason Min Wang; Jun Zhang; Brahim Bensaou

The default caching scheme in CCN results in a high redundancy along the symmetric request-response path, and makes the caching system inefficient. Since it was first proposed, much work has been done to improve the general caching performance of CCN. Most new caching schemes attempt to reduce the on-path redundancy by passing information on content redundancy and popularity between nodes. In this paper, we tackle the problem from a different perspective. Instead of curbing the redundancy through special caching decisions in the beginning, we take an orthogonal approach by pro-actively eliminating redundancy via an independent intra-AS procedure. We propose an \textit{intra-AS cache cooperation} scheme, to effectively control the redundancy level within the AS and allow neighbour nodes in an AS to collaborate in serving each others requests. We show via trace-driven simulation, that intra-AS cache cooperation improves the system caching performance and reduces considerably the traffic load on the AS gateway links, which is very appealing from an ISPs perspective.


modeling analysis and simulation of wireless and mobile systems | 2006

Tradeoff between network lifetime and fair rate allocation in wireless sensor networks with multi-path routing

Junhua Zhu; Ka-Lok Hung; Brahim Bensaou

The network lifetime and application performance are two fundamental but conflicting desig objectives in wireless sensor networks. Hence there is an intrinsic tradeoff between network lifetime maximization and application performance maximization. Often application performance correlates to the application data rate obtained in sensor networks. We can thus study this tradeoff by investigating the interactions between the network lifetime maximization problem and the rate allocation problem. Severe bias on the allocated rates of some sensor nodes may exist if only the total throughput of the sensor network is maximized, hence we enforce fairness on source rates of sensor nodes by invoking the network utility maximization (NUM) framework. First we consider the network lifetime as global information shared by sensor nodes. We formulate the network lifetime maximization and fair rate allocation both as constrained maximization problems. By introducing a system parameter, we combine these two objectives into a single weighted objective, and characterize the tradeoff between them. Then we give the optimality condition, and derive a partially distributed algorithm. Also, we identify the similarity between network lifetime maximization and max-min rate allocation in networks. Since the latter one can be approximated using NUM framework, we adopt the same idea for the former one, and approximate the optimal solution in the unified NUM framework. Based on this, an efficient fully distributed algorithm is derived.


Computer Networks | 2008

Rate-lifetime tradeoff for reliable communication in wireless sensor networks

Junhua Zhu; Ka-Lok Hung; Brahim Bensaou; Farid Naït-Abdesselam

The network lifetime and application performance are two fundamental, yet conflicting, design objectives in wireless sensor networks. There is an intrinsic tradeoff between network lifetime maximization and application performance maximization, the latter being often correlated to the rate at which the application can send its data reliably in sensor networks. In this paper we study this tradeoff by investigating the interactions between the network lifetime maximization problem and the rate allocation problem with a reliable data delivery requirement. Severe bias on the allocated rates of some sensor nodes may exist if only the total throughput of the sensor network is maximized, hence we enforce fairness on source rates of sensor nodes by invoking the network utility maximization (NUM) framework. To guarantee reliable communication, we adopt the hop-by-hop retransmission scheme. We formulate the network lifetime maximization and fair rate allocation both as constrained maximization problems. We characterize the tradeoff between them, give the optimality condition, and derive a partially distributed algorithm to solve the problem. Furthermore, we propose an approximation of the tradeoff problem using NUM framework, and derive a fully distributed algorithm to solve the problem.

Collaboration


Dive into the Brahim Bensaou's collaboration.

Top Co-Authors

Avatar

Danny H. K. Tsang

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Kee Chaing Chua

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Jason Min Wang

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Jun Zhang

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Ka-Lok Hung

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Junhua Zhu

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Xiangming Dai

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ying Wang

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Zuyuan Fang

Hong Kong University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge