Ibrahima Niang - Academia.edu (original) (raw)

Papers by Ibrahima Niang

Research paper thumbnail of Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker’s Efficiency and Coverage

2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID), 2020

Cloud computing dominates the information communication and technology landscape despite the pres... more Cloud computing dominates the information communication and technology landscape despite the presence of lingering security issues such as the interdependency problem. The latter is a co-residence conundrum where the attacker successfully compromises his target virtual machine by first exploiting the weakest (in terms of security) virtual machine that is hosted in the same server. To tackle this issue, we propose a novel virtual machine allocation policy that is based on the attacker’s efficiency and coverage. By default, our allocation policy considers all legitimate users as attackers and then proceeds to host the users’ virtual machines to the server where their efficiency and/or coverage are the smallest. Our simulation results show that our proposal performs better than the existing allocation policies that were proposed to tackle the same issue, by reducing the attacker’s possibilities to zero and by using between 30 - 48% less hosts.

Research paper thumbnail of A Hierarchical Method for Dynamic Job Execution in NREN-based Cloud Systems

Proceedings of the 2nd International Conference on Networking, Information Systems & Security - NISS19, 2019

National Research and Education Networks (NRENs) are digital infrastructures that are essential f... more National Research and Education Networks (NRENs) are digital infrastructures that are essential for innovation in higher education. More and more, it seems obvious to improve Quality of Research and Education through REN Services. Historically, the organization of resources in the NRENs is approached centrally with a data center shared between the universities forming the NREN. This does not reflect the reality because universities also have computing infrastructures and even some laboratories in the university could also have their own servers. In this paper, we propose a new hierarchical scheme for dynamic job execution for NREN Datacenters system. This proposal is based on a three-tier architecture, representing the three levels of a NREN: laboratory, university, NREN.

Research paper thumbnail of D-LBAH: Dynamic Load Balancing Algorithm for HEC-SDN systems

2021 8th International Conference on Future Internet of Things and Cloud (FiCloud), 2021

With the emergence of new applications that have very low latency (i.e. augmented reality, virtua... more With the emergence of new applications that have very low latency (i.e. augmented reality, virtual reality, tactile Internet, etc.), it is very important to propose new solutions to meet these requirements. In addition, with the amount of data generated by these applications in edge computing systems, where resources are limited, the question of automated resource allocation is an important issue for the management of these services. Besides, Edge Computing (EC) systems such as Home Edge Computing (HEC) is one of the architectures which makes it possible to meet these expectations thanks to the proximity of its servers to end-users. HEC is a new architecture of edge computing with three levels of server organization (HEC-MEC-Cloud), that allows us to reduce the communication delay. Unfortunately, these HEC servers that are close to the devices are very limited in terms of resources. In addition, with the amount of data generated by users on these home servers and the current resource management system in this HEC architecture, compliance with the requirements, such as the ultra-low latency (between 1 to 10 ms) and the throughput, for these applications become very difficult especially in certain situations where the network is overload by the traffic from users. In this paper, we propose a dynamically automated resource allocation method in the HEC-SDN architecture. This resource allocation proposal allows the HEC architecture to be integrated with Software Defined Networking (SDN) technology to centralize management and control. In addition, we propose a load balancing technique called Dynamic Load Balancing Algorithm for HEC-SDN systems (D-LBAH) which has a positive effect on reducing latency on the communication between end devices. Thus, the simulation results show that D-LBAH effectively reduces latency to 88.91 %, and improves throughput to 28.48% on the HEC-SDN architecture.

Research paper thumbnail of A Survey on QoS-based communication protocols for IoT systems

Proceedings of the 3rd International Conference on Networking, Information Systems & Security, 2020

Internet of Things (IoT) contributes to development of world through its technological contributi... more Internet of Things (IoT) contributes to development of world through its technological contributions and its daily applications. Several technologies and protocols are used for the implementation of new applications allowing physical objects to connect with each other in support of smart decision-making. To provide efficient and reliable services to its end-users, it guarantees the quality of its pragmatic use by referring to QoS criteria.This implies efficient management of the quality of service in IoT systems in order to meet requirements of their applications. In this paper, we offer an analysis of quality of service mechanisms of communication protocols in IoT environment. This study opens a new perspective of dynamic QoS management.

Research paper thumbnail of Schéma DHT hiérarchique pour la tolérance aux pannes dans les réseaux P2P-SIP

Research paper thumbnail of Vers une structuration auto-stabilisante des réseaux Ad Hoc

ARIMA, Aug 4, 2014

Dans cet article, nous proposons un algorithme de structuration auto-stabilisant, distribué et as... more Dans cet article, nous proposons un algorithme de structuration auto-stabilisant, distribué et asynchrone qui construit des clusters de diamètre au plus 2k. Notre approche ne nécessite aucune initialisation. Elle se fonde uniquement sur l'information provenant des noeuds voisins à l'aide d'échanges de messages. Partant d'une configuration quelconque, le réseau converge vers un état stable après un nombre fini d'étapes. Nous montrons par preuve formelle que pour un réseau de n noeuds, la stabilisation est atteinte en au plus n + 2 transitions. De plus, l'algorithme nécessite une occupation mémoire de (∆u + 1) * log(2n + k + 3) bits pour chaque noeud u où ∆u représente le degré (nombre de voisins) de u et k la distance maximale dans les clusters. Afin de consolider les résultats théoriques obtenus, nous avons effectué une campagne de simulation sous OMNeT++ pour évaluer la performance de notre solution.

Research paper thumbnail of Routage et agrégation de données dans les réseaux de capteurs sans fil structurés en clusters auto-stabilisants

Research paper thumbnail of A Survey Of Access Control Schemes In Wireless Sensor Networks

Access control is a critical security service in Wire- less Sensor Networks (WSNs). To prevent ma... more Access control is a critical security service in Wire- less Sensor Networks (WSNs). To prevent malicious nodes from joining the sensor network, access control is required. On one hand, WSN must be able to authorize and grant users the right to access to the network. On the other hand, WSN must organize data collected by sensors in such a way that an unauthorized entity (the adversary) cannot make arbitrary queries. This restricts the network access only to eligible users and sensor nodes, while queries from outsiders will not be answered or forwarded by nodes. In this paper we presentee different access control schemes so as to ?nd out their objectives, provision, communication complexity, limits, etc. Using the node density parameter, we also provide a comparison of these proposed access control algorithms based on the network topology which can be flat or hierarchical.

Research paper thumbnail of T4PW: TSCH in WBAN for Real-Time Monitoring of Pregnant Women

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2021

Research paper thumbnail of A Token-based MAC Protocol for Linear Sensor Networks

A wireless sensor network is a large number of sensor nodes deployed in a fixed or random manner ... more A wireless sensor network is a large number of sensor nodes deployed in a fixed or random manner over a wide area for environmental monitoring applications. Wireless sensors communicate via wireless links and are powered by batteries. They collect and provide information to the base station usually called sink. The information collected is generally physical, chemical or biological nature. For some of these applications, as pipeline or road monitoring, wireless sensor nodes have to be deployed in a linear manner. We refer to these WSNs as Linear Sensor Networks (LSNs). Due to specificity of LSNs, MAC protocol designed for WSNs, as contention or TDMA based protocols, are often not suitable. Furthermore, wireless node deployment can provide a certain form of redundancy to prevent link or node failures. In this paper, we propose a token based MAC protocol for linear sensor networks in order to improve the network performance. We evaluate the effect of the redundancy on the throughput a...

Research paper thumbnail of P2P4GS : une spécification de grille pair-à-pair de services auto-gérés

Revue Africaine de la Recherche en Informatique et Mathématiques Appliquées, 2014

International audience The grid-based peer-to-peer architectures were used either for storage and... more International audience The grid-based peer-to-peer architectures were used either for storage and data sharing or computing. So far, the proposed solutions with respect to grid services are based on hierarchical topologies, which present a high degree of centralization. The main issue of this centralization is the unified management of resources and the difficult to react rapidly against failure and faults that can affect grid users. In this paper, we propose a original specification, called P2P4GS, that enables selfmanaged service of peer-to- peer grid. Therefore, we design a self-adaptive solution for services deployment and invocation which take account the paradigm of peer-to-peer services. Furthermore, the deployment, and invocation are completely delegated to the platform and are done a transparent manner with respect to the end user. We propose a generic specification that is not related to a particular peer-to-peer architecture or a management protocol services defined in ad...

Research paper thumbnail of A Review of Virtualization, Hypervisor and VM Allocation Security: Threats, Vulnerabilities, and Countermeasures

2018 International Conference on Computational Science and Computational Intelligence (CSCI), 2018

Cloud computing is a very popular information processing concept where infrastructures and soluti... more Cloud computing is a very popular information processing concept where infrastructures and solutions are delivered as services. It uses virtualization technologies to maximize resources utilization such as application performance, etc. These technologies make cloud computing desirable but they also introduce serious threats to service delivery since they allow multiple operating systems to share the same physical machine. This paper proposes a literature review on security solutions for virtualization, hypervisor and virtual machines (VM) allocation Security. We identify cloud computing vulnerabilities, and propose a new classification of known security threats and vulnerabilities into categories. We present different countermeasures to control the vulnerabilities and reduce the threats. We also identify the limitations of these countermeasures and give research perspectives on cloud security particularly on virtualization and VM allocation security.

Research paper thumbnail of Linear Sensor Networks

A wireless sensor network is a large number of sensor nodes deployed in a fixed or random manner ... more A wireless sensor network is a large number of sensor nodes deployed in a fixed or random manner over a wide area for environmental monitoring applications. Wireless sensors communicate via wireless links and are powered by batteries. They collect and provide information to the base station usually called sink. The information collected is generally physical, chemical or biological nature. For some of these applications, as pipeline or road monitoring, wireless sensor nodes have to be deployed in a linear manner. We refer to these WSNs as Linear Sensor Networks (LSNs). Suitable MAC protocols for LSN must take account the linearity in order to ensure reliability and optimize parameters such as the end-to-end delay, the delivery ratio, the throughput, etc. In this paper, we present LTB-MAC a Linear Token Based Mac Protocol designed for linear sensor networks. In this paper we present a comparative study in terms of throughput, delivery ration, end-to-end delay between a Linear Token B...

Research paper thumbnail of A Survey of Game Theoretic Solutions for Cloud Computing Security Issues

Cloud computing has become quintessential to information technology as it represents the foundati... more Cloud computing has become quintessential to information technology as it represents the foundation of all the emerging paradigms. Cloud computing uses virtualization to maximize resources utilization. Despite its benefits, organizations are still reluctant to adopt cloud computing due to its numerous security issues. Among the solutions that have been provided to solve cloud security issues, game theoretic proposals showed great potentials. In this paper, we survey the most representative game theoretic approaches to solve cloud computing security issues. We classify these approaches or methods based on their security scenarios and their respective solutions. We overview different solutions to control cloud vulnerabilities and threats using game theory. We also investigate and identify the limitations of these solutions and provide insights of the future of cloud security particularly on virtual machines, hypervisors and data security.

Research paper thumbnail of A Comparison of QoS-Based Architecture Solutions for IoT/Edge Computing Environment

Research paper thumbnail of Home Edge Computing Architecture for Smart and Sustainable Agriculture and Breeding

Proceedings of the 2nd International Conference on Networking, Information Systems & Security - NISS19, 2019

Challenges of today and tomorrow in developing countries to ensure sustainable food security for ... more Challenges of today and tomorrow in developing countries to ensure sustainable food security for their populations require smart agriculture and breeding. This necessarily depends on water control, soil erosion, livestock management, and so on. At the same time, Internet of Things (IoT) represents the latest evolution of the Internet and can significantly improve the ability to collect, analyze and retrieve data that we can then transform into information, knowledge and finally knowing. In the context of ensuring smart and sustainable agriculture, the importance of IoT seems obvious. Note that, IoT has implications for bandwidth, latency and processing speeds, given the huge amount of data to collect. Edge computing and Systems are one of the emerging solutions to reduce latency and improve bandwidth utilization for real-time applications and services. Thus, to achieve these aims, we propose, in this paper, a new three-tier architecture (3-TIER) for smart agriculture. It is based on that of Home Edge Computing allowing us to achieve ultra-low latency. This architecture will also allow us to effectively solve the problems related to agriculture and livestock breeding, but also to be able to resolve considerably the conflicts between farmers and herders. This proposal will be followed by an experimental validation of HEC architecture using the EdgeCloudSim simulator.

Research paper thumbnail of Home Edge Computing (HEC): Design of a New Edge Computing Technology for Achieving Ultra-Low Latency

Edge Computing – EDGE 2018, 2018

Edge computing systems (Cloudlet, Fog Computing, Multi-access Edge Computing) provide numerous be... more Edge computing systems (Cloudlet, Fog Computing, Multi-access Edge Computing) provide numerous benefits to information technology: reduced latency, improved bandwidth, battery lifetime, etc. Despite all the benefits, edge computing systems have several issues that could significantly reduce the performance of certain applications. Indeed, current edge computing technologies do not assure ultra-low latency for real-time applications and they encounter overloading issues for data processing. To solve the aforementioned issues, we propose Home Edge Computing (HEC): a new three-tier edge computing architecture that provides data storage and processing in close proximity to the users. The term “Home” in Home Edge Computing does not restrain our work to the homes of the users, we take into account other places where the users could connect to the Internet such as: companies, shopping malls, hospitals, etc. Our three-tier architecture is composed of a Home Server, an Edge Server and a Central Cloud which we also find in traditional edge computing architectures. The Home Server is located within the vicinities of the users which allow the achievement of ultra-low latency for applications that could be processed by the said server; this also help reduce the amount of data that could be treated in the Edge Server and the Central Cloud. We demonstrate the validity of our architecture by leveraging the EdgeCloudSim simulation platform. The results of the simulation show that our proposal can, in fact, help achieve ultra-low latency and reduce overloading issues.

Research paper thumbnail of New Node Distributed Access Control Scheme for Wireless Sensor Network

Proceedings of the 9th International Conference on Information Systems and Technologies, 2019

Access control is a critical security service in Wireless Sensor Networks (WSNs). To prevent mali... more Access control is a critical security service in Wireless Sensor Networks (WSNs). To prevent malicious nodes or unauthorized entity from joining the sensor network, access control is required. It restricts the network access only to eligible sensor nodes, while queries from outsiders will not be answered or forwarded by nodes. Since sensor nodes are highly constrained in terms of resources and can be deployed in hostile environment, they may be lost because of power exhaustion or malicious attacks. Therefore, new node deployment is necessary. Schemes based on elliptic curve cryptography (ECC) are proposed. Some of them are static and other dynamic because all the old secret keys and broadcasting information in existing nodes should not be updated once a new node is added. In this paper we proposed a new node access control scheme based on symmetric key cryptography, one-way hash chain and XOR operation, which are low expenses in calculation, storage and communication. The proposed solution provides a distributed authentication system, it is also resistance to node capture, query replay, denial of service (DoS) attacks and probably restricts the propagation of fake queries to a logarithmic part of the network.

Research paper thumbnail of Hierarchical Load Balancing and Clustering Technique for Home Edge Computing

Research paper thumbnail of Forming Groups of Mobile Learners that Promote Collaborative Learning Supported by Mobile Devices

Innovation and Interdisciplinary Solutions for Underserved Areas, 2018

Research paper thumbnail of Solving the Interdependency Problem: A Secure Virtual Machine Allocation Method Relying on the Attacker’s Efficiency and Coverage

2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID), 2020

Cloud computing dominates the information communication and technology landscape despite the pres... more Cloud computing dominates the information communication and technology landscape despite the presence of lingering security issues such as the interdependency problem. The latter is a co-residence conundrum where the attacker successfully compromises his target virtual machine by first exploiting the weakest (in terms of security) virtual machine that is hosted in the same server. To tackle this issue, we propose a novel virtual machine allocation policy that is based on the attacker’s efficiency and coverage. By default, our allocation policy considers all legitimate users as attackers and then proceeds to host the users’ virtual machines to the server where their efficiency and/or coverage are the smallest. Our simulation results show that our proposal performs better than the existing allocation policies that were proposed to tackle the same issue, by reducing the attacker’s possibilities to zero and by using between 30 - 48% less hosts.

Research paper thumbnail of A Hierarchical Method for Dynamic Job Execution in NREN-based Cloud Systems

Proceedings of the 2nd International Conference on Networking, Information Systems & Security - NISS19, 2019

National Research and Education Networks (NRENs) are digital infrastructures that are essential f... more National Research and Education Networks (NRENs) are digital infrastructures that are essential for innovation in higher education. More and more, it seems obvious to improve Quality of Research and Education through REN Services. Historically, the organization of resources in the NRENs is approached centrally with a data center shared between the universities forming the NREN. This does not reflect the reality because universities also have computing infrastructures and even some laboratories in the university could also have their own servers. In this paper, we propose a new hierarchical scheme for dynamic job execution for NREN Datacenters system. This proposal is based on a three-tier architecture, representing the three levels of a NREN: laboratory, university, NREN.

Research paper thumbnail of D-LBAH: Dynamic Load Balancing Algorithm for HEC-SDN systems

2021 8th International Conference on Future Internet of Things and Cloud (FiCloud), 2021

With the emergence of new applications that have very low latency (i.e. augmented reality, virtua... more With the emergence of new applications that have very low latency (i.e. augmented reality, virtual reality, tactile Internet, etc.), it is very important to propose new solutions to meet these requirements. In addition, with the amount of data generated by these applications in edge computing systems, where resources are limited, the question of automated resource allocation is an important issue for the management of these services. Besides, Edge Computing (EC) systems such as Home Edge Computing (HEC) is one of the architectures which makes it possible to meet these expectations thanks to the proximity of its servers to end-users. HEC is a new architecture of edge computing with three levels of server organization (HEC-MEC-Cloud), that allows us to reduce the communication delay. Unfortunately, these HEC servers that are close to the devices are very limited in terms of resources. In addition, with the amount of data generated by users on these home servers and the current resource management system in this HEC architecture, compliance with the requirements, such as the ultra-low latency (between 1 to 10 ms) and the throughput, for these applications become very difficult especially in certain situations where the network is overload by the traffic from users. In this paper, we propose a dynamically automated resource allocation method in the HEC-SDN architecture. This resource allocation proposal allows the HEC architecture to be integrated with Software Defined Networking (SDN) technology to centralize management and control. In addition, we propose a load balancing technique called Dynamic Load Balancing Algorithm for HEC-SDN systems (D-LBAH) which has a positive effect on reducing latency on the communication between end devices. Thus, the simulation results show that D-LBAH effectively reduces latency to 88.91 %, and improves throughput to 28.48% on the HEC-SDN architecture.

Research paper thumbnail of A Survey on QoS-based communication protocols for IoT systems

Proceedings of the 3rd International Conference on Networking, Information Systems & Security, 2020

Internet of Things (IoT) contributes to development of world through its technological contributi... more Internet of Things (IoT) contributes to development of world through its technological contributions and its daily applications. Several technologies and protocols are used for the implementation of new applications allowing physical objects to connect with each other in support of smart decision-making. To provide efficient and reliable services to its end-users, it guarantees the quality of its pragmatic use by referring to QoS criteria.This implies efficient management of the quality of service in IoT systems in order to meet requirements of their applications. In this paper, we offer an analysis of quality of service mechanisms of communication protocols in IoT environment. This study opens a new perspective of dynamic QoS management.

Research paper thumbnail of Schéma DHT hiérarchique pour la tolérance aux pannes dans les réseaux P2P-SIP

Research paper thumbnail of Vers une structuration auto-stabilisante des réseaux Ad Hoc

ARIMA, Aug 4, 2014

Dans cet article, nous proposons un algorithme de structuration auto-stabilisant, distribué et as... more Dans cet article, nous proposons un algorithme de structuration auto-stabilisant, distribué et asynchrone qui construit des clusters de diamètre au plus 2k. Notre approche ne nécessite aucune initialisation. Elle se fonde uniquement sur l'information provenant des noeuds voisins à l'aide d'échanges de messages. Partant d'une configuration quelconque, le réseau converge vers un état stable après un nombre fini d'étapes. Nous montrons par preuve formelle que pour un réseau de n noeuds, la stabilisation est atteinte en au plus n + 2 transitions. De plus, l'algorithme nécessite une occupation mémoire de (∆u + 1) * log(2n + k + 3) bits pour chaque noeud u où ∆u représente le degré (nombre de voisins) de u et k la distance maximale dans les clusters. Afin de consolider les résultats théoriques obtenus, nous avons effectué une campagne de simulation sous OMNeT++ pour évaluer la performance de notre solution.

Research paper thumbnail of Routage et agrégation de données dans les réseaux de capteurs sans fil structurés en clusters auto-stabilisants

Research paper thumbnail of A Survey Of Access Control Schemes In Wireless Sensor Networks

Access control is a critical security service in Wire- less Sensor Networks (WSNs). To prevent ma... more Access control is a critical security service in Wire- less Sensor Networks (WSNs). To prevent malicious nodes from joining the sensor network, access control is required. On one hand, WSN must be able to authorize and grant users the right to access to the network. On the other hand, WSN must organize data collected by sensors in such a way that an unauthorized entity (the adversary) cannot make arbitrary queries. This restricts the network access only to eligible users and sensor nodes, while queries from outsiders will not be answered or forwarded by nodes. In this paper we presentee different access control schemes so as to ?nd out their objectives, provision, communication complexity, limits, etc. Using the node density parameter, we also provide a comparison of these proposed access control algorithms based on the network topology which can be flat or hierarchical.

Research paper thumbnail of T4PW: TSCH in WBAN for Real-Time Monitoring of Pregnant Women

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2021

Research paper thumbnail of A Token-based MAC Protocol for Linear Sensor Networks

A wireless sensor network is a large number of sensor nodes deployed in a fixed or random manner ... more A wireless sensor network is a large number of sensor nodes deployed in a fixed or random manner over a wide area for environmental monitoring applications. Wireless sensors communicate via wireless links and are powered by batteries. They collect and provide information to the base station usually called sink. The information collected is generally physical, chemical or biological nature. For some of these applications, as pipeline or road monitoring, wireless sensor nodes have to be deployed in a linear manner. We refer to these WSNs as Linear Sensor Networks (LSNs). Due to specificity of LSNs, MAC protocol designed for WSNs, as contention or TDMA based protocols, are often not suitable. Furthermore, wireless node deployment can provide a certain form of redundancy to prevent link or node failures. In this paper, we propose a token based MAC protocol for linear sensor networks in order to improve the network performance. We evaluate the effect of the redundancy on the throughput a...

Research paper thumbnail of P2P4GS : une spécification de grille pair-à-pair de services auto-gérés

Revue Africaine de la Recherche en Informatique et Mathématiques Appliquées, 2014

International audience The grid-based peer-to-peer architectures were used either for storage and... more International audience The grid-based peer-to-peer architectures were used either for storage and data sharing or computing. So far, the proposed solutions with respect to grid services are based on hierarchical topologies, which present a high degree of centralization. The main issue of this centralization is the unified management of resources and the difficult to react rapidly against failure and faults that can affect grid users. In this paper, we propose a original specification, called P2P4GS, that enables selfmanaged service of peer-to- peer grid. Therefore, we design a self-adaptive solution for services deployment and invocation which take account the paradigm of peer-to-peer services. Furthermore, the deployment, and invocation are completely delegated to the platform and are done a transparent manner with respect to the end user. We propose a generic specification that is not related to a particular peer-to-peer architecture or a management protocol services defined in ad...

Research paper thumbnail of A Review of Virtualization, Hypervisor and VM Allocation Security: Threats, Vulnerabilities, and Countermeasures

2018 International Conference on Computational Science and Computational Intelligence (CSCI), 2018

Cloud computing is a very popular information processing concept where infrastructures and soluti... more Cloud computing is a very popular information processing concept where infrastructures and solutions are delivered as services. It uses virtualization technologies to maximize resources utilization such as application performance, etc. These technologies make cloud computing desirable but they also introduce serious threats to service delivery since they allow multiple operating systems to share the same physical machine. This paper proposes a literature review on security solutions for virtualization, hypervisor and virtual machines (VM) allocation Security. We identify cloud computing vulnerabilities, and propose a new classification of known security threats and vulnerabilities into categories. We present different countermeasures to control the vulnerabilities and reduce the threats. We also identify the limitations of these countermeasures and give research perspectives on cloud security particularly on virtualization and VM allocation security.

Research paper thumbnail of Linear Sensor Networks

A wireless sensor network is a large number of sensor nodes deployed in a fixed or random manner ... more A wireless sensor network is a large number of sensor nodes deployed in a fixed or random manner over a wide area for environmental monitoring applications. Wireless sensors communicate via wireless links and are powered by batteries. They collect and provide information to the base station usually called sink. The information collected is generally physical, chemical or biological nature. For some of these applications, as pipeline or road monitoring, wireless sensor nodes have to be deployed in a linear manner. We refer to these WSNs as Linear Sensor Networks (LSNs). Suitable MAC protocols for LSN must take account the linearity in order to ensure reliability and optimize parameters such as the end-to-end delay, the delivery ratio, the throughput, etc. In this paper, we present LTB-MAC a Linear Token Based Mac Protocol designed for linear sensor networks. In this paper we present a comparative study in terms of throughput, delivery ration, end-to-end delay between a Linear Token B...

Research paper thumbnail of A Survey of Game Theoretic Solutions for Cloud Computing Security Issues

Cloud computing has become quintessential to information technology as it represents the foundati... more Cloud computing has become quintessential to information technology as it represents the foundation of all the emerging paradigms. Cloud computing uses virtualization to maximize resources utilization. Despite its benefits, organizations are still reluctant to adopt cloud computing due to its numerous security issues. Among the solutions that have been provided to solve cloud security issues, game theoretic proposals showed great potentials. In this paper, we survey the most representative game theoretic approaches to solve cloud computing security issues. We classify these approaches or methods based on their security scenarios and their respective solutions. We overview different solutions to control cloud vulnerabilities and threats using game theory. We also investigate and identify the limitations of these solutions and provide insights of the future of cloud security particularly on virtual machines, hypervisors and data security.

Research paper thumbnail of A Comparison of QoS-Based Architecture Solutions for IoT/Edge Computing Environment

Research paper thumbnail of Home Edge Computing Architecture for Smart and Sustainable Agriculture and Breeding

Proceedings of the 2nd International Conference on Networking, Information Systems & Security - NISS19, 2019

Challenges of today and tomorrow in developing countries to ensure sustainable food security for ... more Challenges of today and tomorrow in developing countries to ensure sustainable food security for their populations require smart agriculture and breeding. This necessarily depends on water control, soil erosion, livestock management, and so on. At the same time, Internet of Things (IoT) represents the latest evolution of the Internet and can significantly improve the ability to collect, analyze and retrieve data that we can then transform into information, knowledge and finally knowing. In the context of ensuring smart and sustainable agriculture, the importance of IoT seems obvious. Note that, IoT has implications for bandwidth, latency and processing speeds, given the huge amount of data to collect. Edge computing and Systems are one of the emerging solutions to reduce latency and improve bandwidth utilization for real-time applications and services. Thus, to achieve these aims, we propose, in this paper, a new three-tier architecture (3-TIER) for smart agriculture. It is based on that of Home Edge Computing allowing us to achieve ultra-low latency. This architecture will also allow us to effectively solve the problems related to agriculture and livestock breeding, but also to be able to resolve considerably the conflicts between farmers and herders. This proposal will be followed by an experimental validation of HEC architecture using the EdgeCloudSim simulator.

Research paper thumbnail of Home Edge Computing (HEC): Design of a New Edge Computing Technology for Achieving Ultra-Low Latency

Edge Computing – EDGE 2018, 2018

Edge computing systems (Cloudlet, Fog Computing, Multi-access Edge Computing) provide numerous be... more Edge computing systems (Cloudlet, Fog Computing, Multi-access Edge Computing) provide numerous benefits to information technology: reduced latency, improved bandwidth, battery lifetime, etc. Despite all the benefits, edge computing systems have several issues that could significantly reduce the performance of certain applications. Indeed, current edge computing technologies do not assure ultra-low latency for real-time applications and they encounter overloading issues for data processing. To solve the aforementioned issues, we propose Home Edge Computing (HEC): a new three-tier edge computing architecture that provides data storage and processing in close proximity to the users. The term “Home” in Home Edge Computing does not restrain our work to the homes of the users, we take into account other places where the users could connect to the Internet such as: companies, shopping malls, hospitals, etc. Our three-tier architecture is composed of a Home Server, an Edge Server and a Central Cloud which we also find in traditional edge computing architectures. The Home Server is located within the vicinities of the users which allow the achievement of ultra-low latency for applications that could be processed by the said server; this also help reduce the amount of data that could be treated in the Edge Server and the Central Cloud. We demonstrate the validity of our architecture by leveraging the EdgeCloudSim simulation platform. The results of the simulation show that our proposal can, in fact, help achieve ultra-low latency and reduce overloading issues.

Research paper thumbnail of New Node Distributed Access Control Scheme for Wireless Sensor Network

Proceedings of the 9th International Conference on Information Systems and Technologies, 2019

Access control is a critical security service in Wireless Sensor Networks (WSNs). To prevent mali... more Access control is a critical security service in Wireless Sensor Networks (WSNs). To prevent malicious nodes or unauthorized entity from joining the sensor network, access control is required. It restricts the network access only to eligible sensor nodes, while queries from outsiders will not be answered or forwarded by nodes. Since sensor nodes are highly constrained in terms of resources and can be deployed in hostile environment, they may be lost because of power exhaustion or malicious attacks. Therefore, new node deployment is necessary. Schemes based on elliptic curve cryptography (ECC) are proposed. Some of them are static and other dynamic because all the old secret keys and broadcasting information in existing nodes should not be updated once a new node is added. In this paper we proposed a new node access control scheme based on symmetric key cryptography, one-way hash chain and XOR operation, which are low expenses in calculation, storage and communication. The proposed solution provides a distributed authentication system, it is also resistance to node capture, query replay, denial of service (DoS) attacks and probably restricts the propagation of fake queries to a logarithmic part of the network.

Research paper thumbnail of Hierarchical Load Balancing and Clustering Technique for Home Edge Computing

Research paper thumbnail of Forming Groups of Mobile Learners that Promote Collaborative Learning Supported by Mobile Devices

Innovation and Interdisciplinary Solutions for Underserved Areas, 2018