Skip to main content

Research Repository

Advanced Search

All Outputs (102)

Power-aware QoS geographical routing for wireless sensor networks - Implementation using Contiki (2010)
Conference Proceeding
Djenouri, D., & Balasingham, I. (2010). Power-aware QoS geographical routing for wireless sensor networks - Implementation using Contiki. In 2010 6th IEEE International Conference on Distributed Computing in Sensor Systems Workshops (DCOSSW). https://doi.org/10.1109/dcossw.2010.5593276

This paper presents the design and implementation of a new geographical quality of service (QoS) routing for wireless sensor networks. The protocol is based on traffic differentiation and provides customized QoS according to the traffic requirement.... Read More about Power-aware QoS geographical routing for wireless sensor networks - Implementation using Contiki.

New QoS and geographical routing in wireless biomedical sensor networks (2009)
Conference Proceeding
Djenouri, D., & Balasingham, I. (2009). New QoS and geographical routing in wireless biomedical sensor networks. https://doi.org/10.4108/icst.broadnets2009.7188

In this paper we deal with biomedical applications of wireless sensor networks, and propose a new quality of service (QoS) routing protocol. The protocol design relies on traffic diversity of these applications and ensures a differentiation routing u... Read More about New QoS and geographical routing in wireless biomedical sensor networks.

LOCALMOR: Localized multi-objective routing for wireless sensor networks (2009)
Conference Proceeding
Djenouri, D., & Balasingham, I. (2009). LOCALMOR: Localized multi-objective routing for wireless sensor networks. https://doi.org/10.1109/pimrc.2009.5449740

This paper proposes a multi-objective quality of service (QoS) routing protocol for wireless sensor networks (WSN). The protocol takes into account the traffic diversity typical for many applications and provides a differentiation in routing using Qo... Read More about LOCALMOR: Localized multi-objective routing for wireless sensor networks.

Brief announcement on MOGRIBA: Multi-objective geographical routing for biomedical applications of WSN (2009)
Conference Proceeding
Djenouri, D., & Balasingham, I. (2009). Brief announcement on MOGRIBA: Multi-objective geographical routing for biomedical applications of WSN. https://doi.org/10.1007/978-3-642-05434-1_16

A new routing protocol for wireless sensor networks is proposed in this paper. The proposed protocol focuses on medical applications, by considering its traffic diversity and providing a differentiation routing using quality of service (QoS) metrics.... Read More about Brief announcement on MOGRIBA: Multi-objective geographical routing for biomedical applications of WSN.

CoP4V: Context-based protocol for vehicle's safety in highways using wireless sensor networks (2009)
Conference Proceeding
Subramanian, S., Djenouri, D., Sindre, G., & Balasingham, I. (2009). CoP4V: Context-based protocol for vehicle's safety in highways using wireless sensor networks. https://doi.org/10.1109/itng.2009.129

Safety is evergreen vital criteria for road traffic. We propose an infrastructureless solution based on contexts to increase safety of vehicle. Contexts characterize and track the moving environment of a vehicle. Here, environment means the vehicle's... Read More about CoP4V: Context-based protocol for vehicle's safety in highways using wireless sensor networks.

Towards immunizing MANET's source routing protocols against packet droppers (2009)
Journal Article
Djenouri, D., Bouamama, M., & Mahmoudi, O. (2009). Towards immunizing MANET's source routing protocols against packet droppers. Journal of Interconnection Networks, 10(1-2), 59-91. https://doi.org/10.1142/s0219265909002443

This paper deals with security of routing protocols of Mobile Ad hoc Networks (MANETs), and proposes a solution to immunize such protocols against packet dropping misbehavior. Most of the current secure protocols are vulnerable to packet dropping mis... Read More about Towards immunizing MANET's source routing protocols against packet droppers.

On eliminating packet droppers in MANET: A modular solution (2008)
Journal Article
Djenouri, D., & Badache, N. (2009). On eliminating packet droppers in MANET: A modular solution. Ad Hoc Networks, 7(6), 1243-1258. https://doi.org/10.1016/j.adhoc.2008.11.003

In this paper we deal with misbehaving nodes in mobile ad hoc networks (MANETs) that drop packets supposed to be relayed, whose purpose may be either saving their resources or launching a DoS attack. We propose a new solution to monitor, detect, and... Read More about On eliminating packet droppers in MANET: A modular solution.

Preventing vehicle crashes through a wireless vehicular sensor network (2008)
Conference Proceeding
Djenouri, D. (2008). Preventing vehicle crashes through a wireless vehicular sensor network. In 2008 24th Biennial Symposium on Communications (320-323). https://doi.org/10.1109/bsc.2008.4563266

In this manuscript we propose a wireless sensor network (WSN) based solution allowing vehicles with merely onboard sensors to avoid frontal collisions in rural highways. Unlike the current solutions that rely on heavy infrastructure, in our vehicular... Read More about Preventing vehicle crashes through a wireless vehicular sensor network.

VANET's mobility models and overtaking: An overview (2008)
Conference Proceeding
Djenouri, D., Soualhi, W., & Nekka, E. (2008). VANET's mobility models and overtaking: An overview. In 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applicationshttps://doi.org/10.1109/ictta.2008.4530189

The most important feature of Vehicular Ad hoc Networks (VANETs) is the high mobility of nodes, which makes the mobility model one of the most important parameters that should be carefully selected when evaluating any protocol. To correctly and faith... Read More about VANET's mobility models and overtaking: An overview.

Selfish behavior on packet forwarding: An emergent security problem in MANET (2008)
Book Chapter
Djenouri, D., & Badache, N. (2008). Selfish behavior on packet forwarding: An emergent security problem in MANET. In Encyclopedia of Wireless and Mobile Communications. Taylor & Francis

The limitation in energy resources along with the multi-hop nature of mobile ad hoc networks cause a new vulnerability, that does not exist in traditional networks. To preserve its own battery, anode may behave selfishly and would not forward packets... Read More about Selfish behavior on packet forwarding: An emergent security problem in MANET.

Simulation of mobility models in vehicular ad hoc networks (2008)
Conference Proceeding
Djenouri, D., Nekka, E., & Soualhi, W. (2008). Simulation of mobility models in vehicular ad hoc networks. https://doi.org/10.4108/icst.ambisys2008.2838

Copyright ACM 2007. One of the emerging applications that belongs to ambient systems is to transparently and directly interconnect vehicles in roads, making an ad hoc network that enables a variety of applications through distritbuted softwares witho... Read More about Simulation of mobility models in vehicular ad hoc networks.

On detecting packets droppers in MANET: A novel low cost approach (2007)
Conference Proceeding
Fahad, T., Djenouri, D., & Askwith, R. (2007). On detecting packets droppers in MANET: A novel low cost approach. https://doi.org/10.1109/ias.2007.47

One of the commonest threats that mobile ad hoc networks are vulnerable to is data packet dropping, which is caused either by malicious or selfish nodes. Most of the existing solutions to solve such misbehaviour rely on the watchdog technique, which... Read More about On detecting packets droppers in MANET: A novel low cost approach.

A new low cost sessions-based misbehaviour detection protocol (SMDP) for MANET (2007)
Conference Proceeding
Fahad, T., Djenouri, D., Askwith, R., & Merabti, M. (2007). A new low cost sessions-based misbehaviour detection protocol (SMDP) for MANET. https://doi.org/10.1109/ainaw.2007.34

There is a strong motivation for a node to deny packet forwarding to others and being selfish in MANET. Recently, some solutions have been proposed, but almost all of these solutions rely on the watchdog technique, which suffers from many drawbacks,... Read More about A new low cost sessions-based misbehaviour detection protocol (SMDP) for MANET.

On securing MANET routing protocol against control packet dropping (2007)
Conference Proceeding
Djenouri, D., Mahmoudi, O., Bouamama, M., Llewellyn-Jones, D., & Merabti, M. (2007). On securing MANET routing protocol against control packet dropping. https://doi.org/10.1109/perser.2007.4283899

In this manuscript we deal with securing routing protocols of mobile ad hoc networks (MANETs) against packet dropping misbehavior. More specifically, we propose a solution to protect control packets of reactive source routing protocols against. Most... Read More about On securing MANET routing protocol against control packet dropping.

Struggling against selfishness and black hole attacks in MANETs (2007)
Journal Article
Djenouri, D., & Badache, N. (2008). Struggling against selfishness and black hole attacks in MANETs. Wireless Communications and Mobile Computing, 8(6), 689-704. https://doi.org/10.1002/wcm.493

Since mobile ad hoc networks (MANETs) are infrastructureless and multi-hop by nature, transmitting packets from any node to another usually relies on services provided by intermediate nodes. This reliance introduces a new vulnerability; one node coul... Read More about Struggling against selfishness and black hole attacks in MANETs.

Ad hoc networks routing protocols and mobility (2006)
Journal Article
Djenouri, D., Derhab, A., & Badache, N. (2006). Ad hoc networks routing protocols and mobility. International Arab Journal of Information Technology, 3(2), 126-133

New power-aware routing protocol for mobile ad hoc networks (2006)
Journal Article
Djenouri, D., & Badache, N. (2006). New power-aware routing protocol for mobile ad hoc networks. International Journal of Ad Hoc and Ubiquitous Computing, 1(3), 126-136. https://doi.org/10.1504/ijahuc.2006.009882

Since devices used in wireless mobile ad hoc networks are generally supplied with limited autonomous resources, energy conservation is one of the most significant aspects in these networks. Recent studies show that the energy consumed for routing dat... Read More about New power-aware routing protocol for mobile ad hoc networks.

Cross-layer approach to detect data packet droppers in mobile ad-hoc networks (2006)
Conference Proceeding
Djenouri, D., & Badache, N. (2006). Cross-layer approach to detect data packet droppers in mobile ad-hoc networks. https://doi.org/10.1007/11822035_14

Mobile ad hoc networks (MANETs) are dynamic infrastructureless networks whose routing protocols are fully based on node cooperation, and where each mobile node relies on other intermediate mobile nodes to send packets towards remote ones. Being anxio... Read More about Cross-layer approach to detect data packet droppers in mobile ad-hoc networks.

Random feedbacks for selfish nodes detection in mobile ad hoc networks (2005)
Conference Proceeding
Djenouri, D., Ouali, N., Mahmoudi, A., & Badache, N. (2005). Random feedbacks for selfish nodes detection in mobile ad hoc networks. https://doi.org/10.1007/11567486_8

A mobile ad hoc network (MANET) is a temporary infrastructureless network, formed by a set of mobile hosts that dynamically establish their own network on the fly without relying on any central administration. Mobile hosts used in MANET have to ensur... Read More about Random feedbacks for selfish nodes detection in mobile ad hoc networks.

A survey of security issues in mobile ad hoc and sensor networks (2004)
Journal Article
Djenouri, D., Khelladi, L., & Badache, A. N. (2005). A survey of security issues in mobile ad hoc and sensor networks. Communications Surveys and Tutorials, IEEE Communications Society, 7(4), 2-28. https://doi.org/10.1109/comst.2005.1593277

Security in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability of wireless links, the limited physical protection of nodes, the dynamically changing topology, the absence of a certification authority, and the lack of... Read More about A survey of security issues in mobile ad hoc and sensor networks.