Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Carole Bassil is active.

Publication


Featured researches published by Carole Bassil.


Vehicular Communications | 2017

VANet security challenges and solutions: A survey

Hamssa Hasrouny; Abed Ellatif Samhat; Carole Bassil; Anis Laouiti

Abstract VANET is an emergent technology with promising future as well as great challenges especially in its security. In this paper, we focus on VANET security frameworks presented in three parts. The first presents an extensive overview of VANET security characteristics and challenges as well as requirements. These requirements should be taken into consideration to enable the implementation of secure VANET infrastructure with efficient communication between parties. We give the details of the recent security architectures and the well-known security standards protocols. The second focuses on a novel classification of the different attacks known in the VANET literature and their related solutions. The third is a comparison between some of these solutions based on well-known security criteria in VANET. Then we draw attention to different open issues and technical challenges related to VANET security, which can help researchers for future use.


digital information and communication technology and its applications | 2015

Privacy using mobile cloud computing

Jacques Bou Abdo; Jacques Demerjian; Hakima Chaouchi; Talar Atechian; Carole Bassil

Crowdsourcing mobile applications are of increasing importance due to their suitability in providing personalized and better matching replies. Crowdsourcing location based services inherit the querying mechanism from its legacy predecessors and this is where the threat lays. In this paper we are going to prove mathematically that the mechanism with highest privacy level “Footprint” does not satisfy the privacy level needed by crowdsourced location based services and then prove that higher privacy level and lower overhead is achieved when these services are implemented in Operator centric mobile cloud architecture.


ad hoc networks | 2017

A review of broadcasting safety data in V2V: Weaknesses and requirements

Hanaa S. Basheer; Carole Bassil

Abstract One of the main goals in using vehicular ad hoc networks (VANETs) system is to provide the driver of a vehicle with services that helps him/her in avoiding chain accidents and traffic jam. Vehicles can get different services from global servers when connecting to the internet or can cooperate with each other, where each vehicle behaves as a collector for traffic information and a disseminator of necessary data to the neighbouring vehicles during their journey. However, disseminating safety data between connecting vehicles is a challenging task due to the quick change in the wireless network topology, and the broadcast protocols reliance on many physical parameters (e.g. vehicles speed, location, roads structures etc.). Thus, getting a reliable VANET system and ensuring the integrity of messages are the main objectives when introducing any dissemination method. This paper reviews several existing VANET safety applications, and revises the disseminating methods for safety messages between vehicles without infrastructure to cover a wide area in a quick reliable way. Wherefore we include relevant works that present different methods to broadcast the warning message between vehicles, particularly when no infrastructure is available. Towards the conclusion, we show a classification tabular for these works, and a comprehensive feedback to reach the optimal perception of the broadcast scheme during safety data dissemination that depends on three objects; the environment, the vehicle as a sender, and the vehicle as a receiver.


IWVSC 2016 : 2nd International Workshop on Vehicular Adhoc Networks for Smart Cities | 2017

Security Risk Analysis of a Trust Model for Secure Group Leader-Based Communication in VANET

Hamssa Hasrouny; Carole Bassil; Abed Ellatif Samhat; Anis Laouiti

In this paper, we consider a Trust Model with Group Leader (GL)-based communication in VANET. This model is used to classify vehicles based on their trustworthiness and elect potential GLs. We propose a security risk assessment methodology and we apply it to our Trust Model. This methodology is used for identifying threats, assessing the risk involved, and defining approaches to mitigate them. The risk assessment includes assessment of the impact and likelihood of occurrence of attacks relevant to the identified threats, evaluation of the Trust Model design principles, validation of the built-in security, and the mitigation actions of attacks. Based on this assessment, we demonstrated the resiliency of the Trust Model to resist to many security attacks.


mediterranean microwave symposium | 2013

Influence of the RTS/CTS in VANET

Gilbert Habib; Carole Bassil

Vehicular Ad hoc Network (VANET) is a new communication paradigm that enables the communication between vehicles moving at high speeds. This kind of communication uses the IEEE 802.11 standard for physical and MAC layer. In order to solve the hidden problem, the IEEE 802.11 uses the RTS/CTS mechanism. Because of the highest mobility in VANET, the RTS/CTS may introduce performance degradation. In this paper, we clarify these effects by studying the influence of this mechanism on the global performance (delay, loss packet...) in terms of bandwidth, packet size... The simulations are done using Ns-2.


Journal of Communications | 2017

Bayesian Trust Scheme: A Decentralized Safety Message Trust Method in Multi-Hop V2V Networks

Hanaa S. Basheer; Carole Bassil; Bilal Chebaro

Abstract Vehicular Ad hoc Networks (VANETs) have an important role in improving road safety especially when no infrastructure is available. Inter vehicle communications (IVCs) provide decentralized communications where vehicles cooperate together to disseminate road traffic data relying on broadcasting reports and warning messages. Trusting the data of every warning message must be accomplished during dissemination as its information is public. Many researches have concentrated on securing the system entities by adding authenticity to each vehicle or aggregating digital signature. These traditional security schemes at some point needed a central management. In this paper, we introduce an approach to trust the information of the warning message before disseminating it through multi-hop V2V communications. This approach is a decentralized scheme that relies on evaluating random environment variables and their conditional dependencies using Bayesian Network (BN). Our contribution is depending on two-stage decentralize data trusting scheme that the warning message passed through before forwarding it further to avoid nodes from acting maliciously.


advanced information networking and applications | 2016

A Framework for Disseminating Trusted Safety Message in V2V Communication

Hanaa S. Basheer; Carole Bassil; Bilal Chebaro

VANET (Vehicular Ad hoc Networks) has become recently one of the most interesting areas of researches in the world of wireless networks. This paper reviews important aspects in VANET as well as commonly encountered problems. Our goal is to present a model to disseminate a warning message properly between vehicles and make trust decision to ensure message integrity before rebroadcast it farther. Our model enhances Vehicle to vehicle communications by avoiding three of the VANETs problems, the broadcast storm problem, the hidden node problem, and incoming message collision at the recipient nodes. A comparison had been made with the efficient directional broadcast (EDB) protocol for message disseminating to evaluate our model results.


2015 International Conference on Applied Research in Computer Science and Engineering (ICAR) | 2015

Toward using data trust model in VANETs

Hanaa S. Basheer; Carole Bassil; Bilal Chebaro

VANET exposed too many data threats due to vehicles short communication time given to cooperate and exchange public information. Using message trust schemes helps in preventing a malicious message from an authorized user to be disseminated between vehicles. In this paper, we introduce security vulnerabilities during exchange safety message between vehicles. Then we propose a suggested data trust algorithm based on hypotheses that help in building a data trusted scheme.


digital information and communication technology and its applications | 2015

Group-based authentication in V2V communications

Hamssa Hasrouny; Carole Bassil; Abed Ellatif Samhat; Anis Laouiti


Wireless Networks | 2018

Trust model for secure group leader-based communications in VANET

Hamssa Hasrouny; Abed Ellatif Samhat; Carole Bassil; Anis Laouiti

Collaboration


Dive into the Carole Bassil's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge