Mohammed Bouhorma
Abdelmalek Essaâdi University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mohammed Bouhorma.
international conference on multimedia computing and systems | 2009
Mohammed Bouhorma; H. Bentaouit; Anouar Boudhir
Ad hoc networks are known by many specifications like multi-hop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols that plays an important role. This paper presents a performance comparison between two reactive routing protocols for mobile ad hoc networks: Dynamic Source Routing (DSR), Ad Hoc On demand distance Vector (AODV).Both protocols were simulated using the tool ns-2 and were compared in terms of packet loss ratio, end to end delay, with mobile nodes varying number of nodes and speed. Simulation revealed that although DSR perfectly scales to small networks with low node speeds, AODV is preferred due to its more efficient use of bandwidth.
ieee international colloquium on information science and technology | 2014
Anass Rghioui; Aziza L'aarje; Fatiha Elouaai; Mohammed Bouhorma
The development of the Internet of Things will greatly facilitate the process of patients diagnosis and monitoring, with small IP-based wireless sensors implemented on the patients body, his physiological parameters, such as blood pressure and heart rate, can be monitored remotely and continuously. This scenario must absolutely respect the confidentiality and privacy of patients medical information, only caregivers and authorized persons should possess the right to access these information. The security must be ensured throughout the healthcare application scenario. This paper presents a study of the potential security problems in this application, and proposes a security model as a solution. Our model is based on symmetric cryptography with a proposed key management system and network nodes authentication mechanism.
international conference on information and communication technology | 2013
Anass Rghioui; Mohammed Bouhorma; Abderrahim Benslimane
The Internet of Things (IoT) is a flagship project that aims to connect objects to the Internet to extend their use. For that, it was needed to find a solution to combine between the IEEE 802.15.4 protocol for Low Power Wireless Personal Area Networks (LoWPANs) and IPv6 network protocol that its large address space will allow million devices to integrate the internet. The development of 6LoWPAN technology was an appropriate solution to deal with this challenge and enable the IoT concept becoming a reality. But this was only the beginning of several challenges and problems like the case of how to secure this new type of networks, especially since it includes two major protocols so the combination of their problems too, over and above new problems specific to that network. In this paper, we analyze the security challenges in 6LoWPAN, we studied the various countermeasures to address these needs, their advantages and disadvantages, and we offer some recommendations to achieve a reliable security scheme for a powerful 6LoWPAN networks.
international conference on communications | 2011
Abderrahim Benslimane; Abdelouahid El Yakoubi; Mohammed Bouhorma
IEEE 802.11 wireless transmissions suffer from a big security flaw as they are vulnerable to Denial of Service Attacks (DoS) which can degrade enormously their performance, especially their achieved throughput. One of the most harmful forms of these attacks is the jamming. In this paper, we provide an analytical model to study the effect of jamming on WLANs. Hence, we implement a physical layer jamming to show the effect at the MAC layer level (i.e. cross-layer jamming). Different jamming scenarios, with different modulation techniques such as DSSS and OFDM, were distinguished in order to evaluate the most accurately possible the effect of jamming on WLANs performance. Extensive simulations, under ns-3 tool, are conducted to validate the correctness of the theoretical analysis. We show that low rates (e.g. 1Mbps) are more resistant to jamming than high rates (e.g. 27Mbps). Also, we show that energy consumption when jamming depends only on communication time. Valuable observations are provided to derive solutions for jamming.
International Journal of Computer Applications | 2011
Said El Brak; Mohammed Bouhorma; Anouar Boudhir
ABSTRACT Mobile Ad hoc Networks (MANETs) play an important role in the pervasive computing to support a wide range of applications. MANETs are self-organizing networks formed spontaneously from a set of mobile devices without any pre-existing fixed infrastructure or administrative support. Network management plays a vital role in the well-being of any communications network. It becomes extremely important and crucial, in order to keep the whole network and application work properly. However, MANETs present several constraints; they are characterized by a dynamic environment and the scarcity of resources. These features make their management rather difficult and a challenging task. Furthermore, the traditional network management approaches become impractical for these networks. This paper provides an overview of the main existing management architecture approaches dedicated to mobile ad hoc networks, and raises their theoretical and practical limitations. And then discusses issues for building efficient management architecture adaptable to MANETs.
telecommunications forum | 2011
Mohammed Bouhorma; Anouar Boudhir; M. Ben Ahmed; S. El Brak
In Mobile Ad hoc Networks, The route discovery mechanism utilize simple flooding method, where a mobile node massively rebroadcasts received route request (RREQ) packets until a route to destination is established. This can cause more retransmissions and thus excessive energy consumption. This work aims to reduce the number of messages RREQ (Route Request), by a new probabilistic and dichotomic method for the discovery of destination. This method can significantly reduce the number of RREQ packets transmitted during route discovery operation. Our simulation analysis can result in significant performance improvements in terms of energy. We propose a new probabilistic algorithm DRREQ (Dichotomic Route Request) which minimize significantly the energy consumption. Extensive simulations have been carried out for evaluation of the performance of our algorithm in different scenarios.
mediterranean microwave symposium | 2009
Mustapha Harmouzi; Mohamed Essaaidi; Mohamed Ben Ahmed; Mohammed Bouhorma
In this paper, a new design of a compact T shaped microstrip antenna for multioperating bands of wireless communication systems is presented. The proposed antenna has the multiband measured performances covering 2.4 GHz band WLAN (2.4–2.484GHz), and the 5-GHz band WLAN (5.15–5.35/5.725–5.825 GHz). Several properties of the proposed compact antenna for multiband operation such as impedance bandwidth, radiation pattern, and measured gain have been numerically and experimentally investigated.
Next Generation Networks and Services (NGNS), 2014 Fifth International Conference on | 2014
Anass Khannous; Anass Rghioui; Fatiha Elouaai; Mohammed Bouhorma
Too many researches have been done using artificial immune systems AIS to solve intrusion detection problems due to several reasons. The self and non-self model based on the Negative Selection Algorithm NSA is the dominant model since it is adopted by the vast majority of these researches. However, this model has some problems especially in terms of scalability and coverage. This paper tries to exploit some interesting concepts proposed by the new danger theory to overcome the problems associated with the self and non-self model. That by improving NSA in order to achieve better detection rates by integrating the basic danger concepts. In this approach, the intrusion detection is related to the damage that can occur in the system and that can be caused by both external elements such as internal elements. The proposed algorithm integrates and combines the basic concepts of intrusion detection systems IDS based on the role of T cells described by the negative selection algorithm, with those inspired by the role of dendritic cells to process the alarm signals and to judge thereafter whether there is presence of a dangerous element or not.
international journal of engineering trends and technology | 2014
Kaoutar Ben Ahmed; Mohammed Bouhorma; Mohamed Ben Ahmed
Data will soon become one of the most precious treasures we have ever had, 43 TRILLION GIGABYTES of data will be created by 2020 according to a study made by Mckinsey Global Institute, its estimated that 2.3 TRILLION GIGABYTES of data is created each day and most companies in the US have 100.000 GIGABYTES of data stored. Data is recorded, stored and analyzed to enable technology and services that the world relies on every day, this technology is getting smarter and we will be soon living in a world of smart services or what is called smart cities. This article presents an overview of the topic pointing to its actual status and forecasting the crucial roles it will play in the future, we will define big data analytics and smart cities and talk about their potential contributions in changing our way of living and finally we will discuss the possible down side of this upcoming technologies and how it can fool us, violate our privacy and turn us into puppets or technology slaves.
International Journal of Computer Applications | 2013
Ibrahim Abdallah Hag Eltoum; Mohammed Bouhorma
Smartphones are advanced versions of cell phones which can provide multi functions tasks. Most Smartphones have the following facilities: E-mails, Cameras, Wi-Fi connectivity, and comprehensive user interface such as touch screen and built in GPS system and interface for installing new applications. Using outdoor location-based services associated with GPS/GPRS have widely out broken. This paper aims at developing a velocity based system for location tracking that will be more convenient for users and more reliable, putting into consideration the expenses for the network service and increasing the accuracy in Smartphones.