Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Manel Abdelkader is active.

Publication


Featured researches published by Manel Abdelkader.


global communications conference | 2010

A novel advanced identity management scheme for seamless handoff in 4G wireless networks

Manel Abdelkader; Mohamed Hamdi; Noureddine Boudriga

Services provided across 4G networks are mainly characterized by ubiquity and convergence. Thus, a user needs to be identified and authenticated to different serving networks and service providers. The definition of different identities for the same user would be hardly manageable since it would introduce identity confusion and heavy management procedures, especially in the overlapping zones. Therefore, unique identifer assignment and management techniques in heterogeneous environments will be a must. In this paper, we introduce a new syntax for the Temporal Mobile Subscriber identity (TMSI) and develop the associated secure identity management process. We show that our scheme, called Advanced Identity Management (AIM) guarantees mutual authentication, privacy, and tracking avoidance, which are of primary importance in 4G networks.


new technologies, mobility and security | 2008

Voronoi-Based Sensor Network Engineering for Target Tracking Using Wireless Sensor Networks

Manel Abdelkader; Mohamed Hamdi; Noureddine Boudriga

Recent advances in integrated electronic devices motivated the use of wireless sensor networks in many applications including target surveillance and tracking. A number of sensor nodes are scattered within a sensitive region to detect the presence of intruders and forward subsequent events to the analysis center(s). Obviously, the sensor deployment should guarantee an optimal event detection rate. This paper proposes a tracking framework based on Voronoi tessellations. Two mobility models are proposed to control the coverage degree according to target presence. The objective is to set a non-uniform coverage within the monitored zone to allow detecting the target by multiple sensor nodes. Moreover, we introduce an algorithm to discover redundant nodes (which do not provide additional information about target position). This algorithm is shown to be effective in reducing the energy consumption using an activity scheduling approach.


international conference on wireless communications and mobile computing | 2011

Game theory and iterated Voronoi diagrams for self-organized Wireless Sensor Networks

Manel Abdelkader; Mohamed Hamdi; Noureddine Boudriga

Wireless Sensor Networks (WSNs) have become an attractive technology to support various applications. In many situations, the region where the sensor nodes are deployed needs to be uniformly covered. This paper proposes a new technique to implement self-organization strategies for WSNs. We show that the process of iterating the computation of the Voronoi diagram generated by the sensors has a maximum fixed point which corresponds to the Nash equilibrium of a strategic game where sensor nodes move iteratively to the centers of the Voronoi cells. We have shown that this fixed-point represents the best deployment that can be achieved, from the coverage point of view. We also performed a set of experiments to show that the proposed technique outperform the existing approaches.


Journal of Networks | 2009

Multi-target Tracking Using Wireless Sensor Networks Based on Higher-Order Voronoi Diagrams

Manel Abdelkader; Mohamed Hamdi; Noureddine Boudriga

Recent advances in integrated electronic devices motivated the use of Wireless Sensor Networks (WSNs) in many applications including target surveillance and tracking. A number of sensor nodes are scattered within a sensitive region to detect the presence of intruders and forward subsequent events to the analysis center(s). Obviously, the sensor deployment should guarantee an optimal event detection rate. This paper proposes a tracking framework based on Voronoi tessellations. Two mobility models are proposed to control the coverage degree according to target presence. The objective is to set a non-uniform coverage within the monitored zone to allow detecting the target(s) by multiple sensor nodes. We show how the proposed algorithm adapts to the situation where multiple targets move in the monitored zone. Moreover, we introduce an algorithm to discover redundant nodes (which do not provide additional information about target position). This algorithm is shown to be effective in reducing the energy consumption using an activity scheduling approach. Simulations are carried out to underline the efficiency of the proposed models.


use of p2p grid and agents for the development of content networks | 2008

GRIDSAN: an available dynamic grid system for ad hoc networks

Manel Abdelkader; Mouna Skouri; Noureddine Boudriga

In this paper, we propose an available infrastructure-less GRID solution based on mobile ad hoc networks denoted by GRIDSAN. This solution provides GRID services while ensuring adaptability and tolerance to node movement. It also dynamically exploits ad hoc resources to offer available GRID services. In such environment, payment presents an important mean to motivate and redeem mobile nodes cooperation. In this paper, we present a payment model adapted to GRIDSAN. This paper also deals with some security aspects especially with payment.


international conference on e-business and telecommunication networks | 2006

SAGA: An Adaptive Infrastructure for Secure Available GRID on Ad-Hoc Networks

Manel Abdelkader; Noureddine Boudriga; Mohammad S. Obaidat

Security management is a major issue in grid computing systems. One approach to provide security is to implement techniques such as encryption and access control on all grid elements. The overhead generated by such an approach may however limit the advantages of grid computing systems; particularly, when the network experiences different types of variations. This paper examines the integration of the notion of adaptive grid service along with security management and accounting. It also provides a fault tolerance technique to build grid systems that are intrusion tolerant.


international conference on electronics, circuits, and systems | 2005

Intrusion tolerant GRID in ad-hoc networks

Manel Abdelkader; Noureddine Boudriga

Computational GRID on ad-hoc networks allows users to benefit from heterogeneous resources independently of their location. Access to those resources should be highly secured. This paper presents two contributions to define and manage trust for GRID applications in ad-hoc networks. First, we define a dynamic trust model that enables to dynamically assign trust levels to nodes according to their behavior in their cluster. Second, we use the proposed model to define the notion of tolerant GRID to intrusions targeting ad-hoc resources.


International Conference on Grid and Distributed Computing | 2009

A Dynamic Mobile Grid System for 4G Networks

Manel Abdelkader; Mohamed Hamdi Noureddine Boudriga

Future networks specially International Mobile Telecommunications-advanced, better known as 4G, will come up with a panoply of services so as to provide a comprehensive and secure IP-based solution where facilities such as voice, data and stremed multimedia will be provided to users anywhere at anytime. This solution will also provide much higher data rates compared to previous generations. More importantly, the 4G architecture will strongly promote ubiquitous computing, which involves many computational devices and systems simultaneously. Such devices and systems can even be unaware that they are contributing to computational process.


international conference on e business | 2007

A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting

Manel Abdelkader; Noureddine Boudriga; Mohammad S. Obaidat

Grids are considered an attractive way of distributed applications that can be cost-effectively developed on 4G networks. They are described by large scale resource sharing and pioneering distributed applications. The design and deployment of a service in a 4G Grid platform can be performed in real time without a prior knowledge of any contributing node. It can be used resourcefully to realize complicated applications while offering a full control. In this paper, we present a new secure and efficient micropayment technique based on the Grid concept. Our proposed method presents a solution to pay anonymous parties present on various 4G networks, while permitting tracing payment operations required format. Finally, we employ the architecture of Grid services to identify a security paradigm for micropayment, which permits shielding of the involved parties in a distributed manner.


international conference on e-business and telecommunication networks | 2006

SPUR: A secured protocol for UMTS registration

Manel Abdelkader; Noureddine Boudriga

This paper presents a new scheme for mobile identification and registration in UMTS networks. Our approach attempts to alleviate different limitations observed with the current solutions (such as the 3GPP). It guarantees the protection of the data transmitted on the SIP messages during the registration procedure. Our method provides the authentication of the main entities involved in the registration procedure. It develops a mechanism for the management of relating security associations.

Collaboration


Dive into the Manel Abdelkader's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge