Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yacine Challal is active.

Publication


Featured researches published by Yacine Challal.


Computer Networks | 2014

Energy Efficiency in Wireless Sensor Networks: a top-down survey

Tifenn Rault; Abdelmadjid Bouabdallah; Yacine Challal

The design of sustainable wireless sensor networks (WSNs) is a very challenging issue. On the one hand, energy-constrained sensors are expected to run autonomously for long periods. However, it may be cost-prohibitive to replace exhausted batteries or even impossible in hostile environments. On the other hand, unlike other networks, WSNs are designed for specific applications which range from small-size healthcare surveillance systems to large-scale environmental monitoring. Thus, any WSN deployment has to satisfy a set of requirements that differs from one application to another. In this context, a host of research work has been conducted in order to propose a wide range of solutions to the energy-saving problem. This research covers several areas going from physical layer optimization to network layer solutions. Therefore, it is not easy for the WSN designer to select the efficient solutions that should be considered in the design of application-specific WSN architecture. We present a top-down survey of the trade-offs between application requirements and lifetime extension that arise when designing wireless sensor networks. We first identify the main categories of applications and their specific requirements. Then we present a new classification of energy-conservation schemes found in the recent literature, followed by a systematic discussion as to how these schemes conflict with the specific requirements. Finally, we survey the techniques applied in WSNs to achieve trade-off between multiple requirements, such as multi-objective optimisation.


Journal of Network and Computer Applications | 2013

Review: Wireless sensor networks for rehabilitation applications: Challenges and opportunities

Abdelkrim Hadjidj; Marion Souil; Abdelmadjid Bouabdallah; Yacine Challal; Henry L. Owen

Rehabilitation supervision has emerged as a new application of wireless sensor networks (WSN), with unique communication, signal processing and hardware design requirements. It is a broad and complex interdisciplinary research area on which more than one hundred papers have been published by several research communities (electronics, bio-mechanical, control and computer science). In this paper, we present WSN for rehabilitation supervision with a focus on key scientific and technical challenges that have been solved as well as interdisciplinary challenges that are still open. We thoroughly review existing projects conducted by several research communities involved in this exciting field. Furthermore, we discuss the open research issues and give directions for future research works. Our aim is to gather information that encourage engineers, clinicians and computer scientists to work together in this field to tackle the arising challenges. We believe that bridging researchers with different scientific backgrounds could have a significant impact on the development of WSN for rehabilitation and could improve the way rehabilitation is provided today.


Journal of Network and Computer Applications | 2011

Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks

Yacine Challal; Abdelraouf Ouadjaout; Mouloud Bagaa; Abdelkrim Hadjidj

In wireless sensor networks, reliability is a design goal of a primary concern. To build a comprehensive reliable system, it is essential to consider node failures and intruder attacks as unavoidable phenomena. In this paper, we present a new intrusion-fault tolerant routing scheme offering a high level of reliability through a secure multipath routing construction. Unlike existing intrusion-fault tolerant solutions, our protocol is based on a distributed and in-network verification scheme, which does not require any referring to the base station. Furthermore, it employs a new multipath selection scheme seeking to enhance the tolerance of the network and conserve the energy of sensors. Extensive analysis and simulations using TinyOS showed that our approach improves many important performance metrics such as: the mean time to failure of the network, detection overhead of some security attacks, energy consumption, and resilience.


IEEE Communications Surveys and Tutorials | 2004

A taxonomy of multicast data origin authentication: Issues and solutions

Yacine Challal; Hatem Bettahar; Abdelmadjid Bouabdallah

Multicasting is an efficient communication mechanism for group-oriented applications such as videoconferencing, broadcasting stock quotes, interactive group games, and video on demand. The lack of security obstructs a large deployment of this efficient communication model. This limitation motivated a host of research works that have addressed the many issues relating to securing the multicast, such as confidentiality, authentication, non-repudiation, integrity, and access control. Many applications, such as broadcasting stock quotes and video-conferencing, require data origin authentication of the received traffic. Hence, data origin authentication is an important component in the multicast security architecture. Multicast data origin authentication must take into consideration the scalability and the efficiency of the underlying cryptographic schemes and mechanisms, because multicast groups can be very large and the exchanged data is likely to be heavy in volume (streaming). Besides, multicast data origin authentication must be robust enough against packet loss because most multicast multimedia applications do not use reliable packet delivery. Therefore, multicast data origin authentication is subject to many concurrent and competitive challenges, when considering these miscellaneous application-level requirements and features. In this article we review and classify recent works dealing with the data origin authentication problem in group communication, and we discuss and compare them with respect to some relevant performance criteria.


international conference on computer communications and networks | 2012

Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks

Ahmed Lounis; Abdelkrim Hadjidj; Abdelmadjid Bouabdallah; Yacine Challal

There has been a host of research works on wireless sensor networks for medical applications. However, the major shortcoming of these efforts is a lack of consideration of data management. Indeed, the huge amount of high sensitive data generated and collected by medical sensor networks introduces several challenges that existing architectures cannot solve. These challenges include scalability, availability and security. In this paper, we propose an innovative architecture for collecting and accessing large amount of data generated by medical sensor networks. Our architecture resolves all the aforementioned challenges and makes easy information sharing between healthcare professionals. Furthermore, we propose an effective and flexible security mechanism that guarantees confidentiality, integrity as well as fine grained access control to outsourced medical data. This mechanism combines several cryptographic schemes to achieve high flexibility and performance.


IEEE Transactions on Wireless Communications | 2013

A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks

Walid Bechkit; Yacine Challal; Abdelmadjid Bouabdallah; Vahid Tarokh

Given the sensitivity of the potential WSN applications and because of resource limitations, key management emerges as a challenging issue for WSNs. One of the main concerns when designing a key management scheme is the network scalability. Indeed, the protocol should support a large number of nodes to enable a large scale deployment of the network. In this paper, we propose a new scalable key management scheme for WSNs which provides a good secure connectivity coverage. For this purpose, we make use of the unital design theory. We show that the basic mapping from unitals to key pre-distribution allows us to achieve high network scalability. Nonetheless, this naive mapping does not guarantee a high key sharing probability. Therefore, we propose an enhanced unital-based key pre-distribution scheme providing high network scalability and good key sharing probability approximately lower bounded by 1-e-1 ≈ 0.632. We conduct approximate analysis and simulations and compare our solution to those of existing methods for different criteria such as storage overhead, network scalability, network connectivity, average secure path length and network resiliency. Our results show that the proposed approach enhances the network scalability while providing high secure connectivity coverage and overall improved performance. Moreover, for an equal network size, our solution reduces significantly the storage overhead compared to those of existing solutions.


acm special interest group on data communication | 2004

SAKM: a scalable and adaptive key management approach for multicast communications

Yacine Challal; Hatem Bettahar; Abdelmadjid Bouabdallah

Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applications, the traffic encryption key has to be changed whenever a user joins or leaves the system. Such a change has to be communicated to all the current users. The bandwidth used for such rekeying operation could be high when the group size is large. The proposed solutions to cope with this limitation, commonly called 1 affects n phenomenon, consist of organizing group members into subgroups that use independent traffic encryption keys. This kind of solutions introduce a new challenge which is the requirement of decrypting and reencrypting multicast messages whenever they pass from one subgroup to another. This is a serious drawback for applications that require real-time communication such as video-conferencing. In order to avoid the systematic decryption / reencryption of messages, we propose in this paper an adaptive solution which structures group members into clusters according to the application requirements in term of synchronization and the membership change behavior in the secure session. Simulation results show that our solution is efficient and typically adaptive compared to other schemes.


Computer Networks | 2007

Key management for content access control in a hierarchy

H. Ragab Hassen; Abdelmadjid Bouabdallah; Hatem Bettahar; Yacine Challal

The need for content access control in hierarchies (CACH) appears naturally in all contexts where a set of users have different access rights to a set of resources. The hierarchy is defined using the access rights. The different resources are encrypted using different keys. Key management is a critical issue for scalable content access control. In this paper, we study the problem of key management for CACH. We present main existing access control models, and show why these models are not suitable to the CACH applications, and why they are not implemented in the existing key management schemes. Furthermore, we classify these key management schemes into two approaches, and construct an access control model for each approach. The proposed access control models are then used to describe the schemes in a uniform and coherent way. A final contribution of our work consists of a classification of the CACH applications, a comparison of the key management schemes, and a study of the suitability of the existing schemes to the CACH applications with respect to some analytical measurements.


IEEE Communications Surveys and Tutorials | 2014

Data Aggregation Scheduling Algorithms in Wireless Sensor Networks: Solutions and Challenges

Miloud Bagaa; Yacine Challal; Adlen Ksentini; Abdelouahid Derhab; Nadjib Badache

Energy limitation is the main concern of any wireless sensor network application. The communication between nodes is the greedy factor for the energy consumption. One important mechanism to reduce energy consumption is the in-network data aggregation. In-network data aggregation removes redundancy as well as unnecessary data forwarding, and hence cuts on the energy used in communications. Recently a new kind of applications are proposed which consider, in addition to energy efficiency, data latency and accuracy as important factors. Reducing data latency helps increasing the network throughput and early events detection. Before performing the aggregation process, each node should wait for a predefined time called WT (waiting time) to receive data from other nodes. Data latency (resp., accuracy) is decreased (resp., increased), if network nodes are well scheduled through optimal distribution of WT over the nodes. Many solutions have been proposed to schedule network nodes in order to make the data aggregation process more efficient. In this paper, we propose a taxonomy and classification of existing data aggregation scheduling solutions. We survey main solutions in the literature and illustrate their operations through examples. Furthermore, we discuss each solution and analyze it against performance criteria such as data latency and accuracy, energy consumption and collision avoidance. Finally, we shed some light on future research directions and open issues after deep analysis of existing solutions.


Journal of Network and Computer Applications | 2012

Review: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy

Mawloud Omar; Yacine Challal; Abdelmadjid Bouabdallah

A mobile ad hoc network is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management. Securing the exchanges in such network is compulsory to guarantee a widespread development of services for this kind of networks. The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. There is a host of research efforts in trust models framework to securing mobile ad hoc networks. The majority of well-known approaches is based on public-key certificates, and gave birth to miscellaneous trust models ranging from centralized models to web-of-trust and distributed certificate authorities. In this paper, we survey and classify the existing trust models that are based on public-key certificates proposed for mobile ad hoc networks, and then we discuss and compare them with respect to some relevant criteria. Also, we have developed analysis and comparison among trust models using stochastic Petri nets in order to measure the performance of each one with what relates to the certification service availability.

Collaboration


Dive into the Yacine Challal's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hatem Bettahar

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar

Abdelkrim Hadjidj

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Walid Bechkit

University of Technology of Compiègne

View shared research outputs
Top Co-Authors

Avatar

Nadjib Badache

University of Science and Technology Houari Boumediene

View shared research outputs
Top Co-Authors

Avatar

Abdelraouf Ouadjaout

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Tifenn Rault

Centre national de la recherche scientifique

View shared research outputs
Researchain Logo
Decentralizing Knowledge