wassim jerbi | ISET SFAX (original) (raw)
Papers by wassim jerbi
IEEE Transactions on Industrial Informatics
2022 International Wireless Communications and Mobile Computing (IWCMC)
2022 International Wireless Communications and Mobile Computing (IWCMC)
Data in Brief, 2018
We present neonicotinoid concentrations in guttation drops of commonly used maize (Zea mays) cult... more We present neonicotinoid concentrations in guttation drops of commonly used maize (Zea mays) cultivars, germinated from seeds coated with active substances (a.s.): i) imidacloprid (IMD), ii) clothianidin (CTN) and iii) thiamethoxam (THM) over two growing seasons. In one variant clothianidin was applied as seed granule. The trial took place at the experimental fields of the Julius Kühn-Institut in Berlin in 2010 and 2011. Data from 2010 are related to a presentation of "Pesticides in guttation droplets following seed treatment-field studies" (Schenke et al., 2011) [1] presented at the SETAC North America conference and only some figures were used in the "Scientific opinion on the science behind the development of a risk assessement of plant protection products on bees (Apis mellifera, Bombus spp. and solitary bees)" (EFSA, 2012) [2]. Only parts of the data from 2011 was presented in relation to the "Exposure of Coccinellidae to guttation droplets on maize seedlings with seed or granule treatment of neonicotinoids" (Schenke and Heimbach, 2014) [3]. The article describes the study sites, the variants of treated maize seeds, sample collection and the analytical methods used to quantify the neonicotinoids and relevant metabolites of IMD (5-OH-IMD and IMD-olefine) and of THM (CTN) in guttation drop samples. The complete field data set is publicly available at the Contents lists available at ScienceDirect
2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2012
ABSTRACT This work describes a framework for the elaboration and evaluation of management policie... more ABSTRACT This work describes a framework for the elaboration and evaluation of management policies for production and transportation supply chains in the forest product industry. The approach deals with the issue of coordination between the tactical and operational decision levels. First, we introduce LogiLab, a software system allowing to model the network and to optimize product flows in the supply chain. We than show how one can use this tactical aggregated plan to identify management policies that will guide day to day operations at the operational level. Finally, a discrete event simulation model allows assessing with more details what would be the impact of implementing these policies at the operational/execution level.
Computer Science & Information Technology ( CS & IT ), 2016
2020 International Wireless Communications and Mobile Computing (IWCMC), 2020
Technologies have become more reliable, more optimal, and less costly in terms of calculation, st... more Technologies have become more reliable, more optimal, and less costly in terms of calculation, storage and energy consumption. However, despite this success, due to the threat of cyber attacks, the security of Internet of Things (IoT) remains one of the major problems hampering the evolution and rapid deployment of this technology. This article consists of the creation of a security system to ensure the authentication services of connected objects, the integrity of the data exchanged between them and the confidentiality of information. This approach must take into account the constraints of the objects and communication technologies used. We have created a protocol which authenticates the object when it is associated and which protects the integrity of the data exchanged in unicast mode and subsequently improved in Broadcast mode. We try to design a secure multicast routing protocol Crypto-IoT that takes into account the constraints of the WSN and IoT. We evaluate the efficacy of ou...
Proceedings of the Euro American Conference on Telematics and Information Systems, 2018
The Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol is known as a pioneering protocol f... more The Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol is known as a pioneering protocol for distributed clustering. It is based on a probabilistic calculation to select cluster head. Successive LEACH protocols have involved other parameters for the selection of cluster head, such as residual energy, location, signal strength ... However, most of these protocols do not guarantee full coverage network for all cycles. Indeed, in some cycles, cluster head may be concentrated in a portion of the monitored area, some common nodes fail to reach a cluster head. They are considered orphans nodes in the network. After 100 rounds, the first dead nodes are the sensors of the clusters of low density. The major contribution of this article is to propose a solution to join the orphan nodes to the closest clusters and consequently to have a high connectivity rate of the nodes. The work in this thesis resulted in the design and development of a new distributed clustering protocol called high...
Proceedings of the 10th Euro-American Conference on Telematics and Information Systems, 2020
Advances in the world of embedded systems have fostered the emergence of intelligent objects know... more Advances in the world of embedded systems have fostered the emergence of intelligent objects known as the Internet of Things. These objects integrate, in a context of low energy consumption, a microcontroller making it possible to control a sensor and / or an actuator combined with a communication capability. The great power of the IoT lies in the fact that its objects communicate, analyze, process and manage data autonomously and without any human intervention. However, security issues are a major obstacle to the development and rapid deployment of this high technology. Safety is a balance between cost and benefit. The purpose of security is to make the cost of the attack too great for the expected gain. Finally, the proposed solution will be evaluated using Telosb sensors, comparison with the protocols KMMR and AODV. The performance results confirm we protocol Key Management Generation (KMG) is robust and efficient, provides a less consumption energy, fast calculation time, a good...
2021 18th International Multi-Conference on Systems, Signals & Devices (SSD), 2021
A Vehicular Ad Hoc Network is a dynamic network due to uncertain vehicles presence on the road an... more A Vehicular Ad Hoc Network is a dynamic network due to uncertain vehicles presence on the road and data transmission among vehicles and Road Side Unit (RSU). Efficient communication among the vehicles and RSUs is useful for the Intelligent Transportation System (ITS). There are two types of communication Vehicle 2 Vehicle (V2V), and Vehicle 2 Infrastructure (V2I) performs in VANET by mobile ad hoc technology. The communication performance of the VANET depends on the routing data. The routing protocols play an important role in efficient data routing in VANET. VANET routing protocols are reviewed, and clustering in VANET is introduced in this study. An extensive survey is carried out on various benchmark clustering algorithms designed by different researchers for Cluster Head (CH) selection. Various parameters for evaluating the performance in a network are compared and analyzed. Also, we introduce our proposed algorithm which aims to increase the reliability of VANET routing.
Wireless Sensor Networks (WSN) are generally battery-powered devices. As energy consumption incre... more Wireless Sensor Networks (WSN) are generally battery-powered devices. As energy consumption increases exponentially with communication distance, multi-hop routing is very advantageous to save energy and prolong network lifetime. For these reasons, we propose, in this paper, ML-LEACH (Multi-Level clustering for Low Energy Adaptive Clustering Hierarchy) protocol that partitions uniformly a large-scale network into different layers. The election of cluster heads is performed in each layer to keep coverage of the whole monitored network area. Cluster heads in each layer collaborate with the adjacent upper layer to transmit sensor's data to the base station. Accordingly, we build a multi-level hierarchy to reduce the communication distance between sensor nodes and better distribute the energy load among them especially when the density of network is higher. Simulation results show that the proposed ML-Leach protocol achieves significant improvements in term of energy consumption, cov...
ArXiv, 2016
The applications require coverage of the whole monitored area for long periods of time. Clusterin... more The applications require coverage of the whole monitored area for long periods of time. Clustering is a way to reduce communications, minimize energy consumption and organize messages among the cluster head and their members. The message exchange of communication and data transmission between the different sensor nodes must be minimized to keep and extended the lifetime of the network because of limited energy resources of the sensors. In this paper, we take into consideration the problem isolated nodes that are away from the cluster head (CH) and by consequence or CH is not within the reach from these nodes. To solve this problem, we propose O-LEACH (Orphan Low Energy Adaptive Clustering Hierarchy) a routing protocol that takes into account the orphan nodes. Indeed, a cluster member will be able to play the role of a gateway which allows the joining of orphan nodes. Our contribution is to election a cluster head that has enough energy for a better now to coordinate with these membe...
Wireless sensor networks are a new family of computer systems that can observe the world with unp... more Wireless sensor networks are a new family of computer systems that can observe the world with unprecedented resolution. These systems promise to revolutionize the field of environmental monitoring. However, for the large-scale deployment of sensor network, data security must be ensured. In this context, this paper aims to provide solutions to ensure the authentication of users before having access to services and data collected by the sensor network. In this paper, we seek to accelerate the computation of scalar multiplications by using the paralleling technique which consists in distributing the calculation into several independent tasks that can be processed simultaneously by different nodes. We try to design a secure multicast routing protocol Crypto-ECC that takes into account the constraints of the WSN. Finally, the proposed solution will be evaluated using Telosb sensors.
International Journal of High Performance Computing and Networking
Sensors are lightweight platforms, with limited computing power and energy reserves. However, our... more Sensors are lightweight platforms, with limited computing power and energy reserves. However, our article is all about creating a secure routing protocol that provides reliable communications. The crypto-ECC contributions seek to accelerate the computation of scalar multiplications by using the paralleling technique which consists of distributing the calculation into several independent tasks that can be processed simultaneously by different nodes. This submission tries to design a secure multicast new routing protocol crypto-ECC that allows the generation and management of cryptographic keys and that takes into account the constraints of the wireless sensor networks and internet of things. Finally, the proposed solution will be evaluated using Telosb sensors, in comparison with earlier work. Performance evaluation using the TOSSIM simulator shows that crypto-ECC is scalable, offers secure links, and provides excellent key connectivity.
2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR)
2021 International Wireless Communications and Mobile Computing (IWCMC)
Journal of Sensors
The emergence of IoT applications has risen the security issues of the big data sent by the IoT d... more The emergence of IoT applications has risen the security issues of the big data sent by the IoT devices. The design of lightweight cryptographic algorithms becomes a necessity. Moreover, elliptic curve cryptography (ECC) is a promising cryptographic technology that has been used in IoT. However, connected objects are resource-constrained devices, with limited computing power and energy power. Driven by these motivations, we propose and develop a secure cryptographic protocol called CoopECC which leverages the organization of IoT nodes into cluster to distribute the load of cluster head (CH) among its cluster members. This technique proves that it optimizes the resource consumption of the IoT nodes including computation and energy consumption. Performance evaluation, done with TOSSIM simulator, shows that the proposed protocol CoopECC outperforms the original ECC algorithm, in terms of computation time, consumed energy, and the network’s lifespan.
International Journal of High Performance Computing and Networking
IEEE Transactions on Industrial Informatics
2022 International Wireless Communications and Mobile Computing (IWCMC)
2022 International Wireless Communications and Mobile Computing (IWCMC)
Data in Brief, 2018
We present neonicotinoid concentrations in guttation drops of commonly used maize (Zea mays) cult... more We present neonicotinoid concentrations in guttation drops of commonly used maize (Zea mays) cultivars, germinated from seeds coated with active substances (a.s.): i) imidacloprid (IMD), ii) clothianidin (CTN) and iii) thiamethoxam (THM) over two growing seasons. In one variant clothianidin was applied as seed granule. The trial took place at the experimental fields of the Julius Kühn-Institut in Berlin in 2010 and 2011. Data from 2010 are related to a presentation of "Pesticides in guttation droplets following seed treatment-field studies" (Schenke et al., 2011) [1] presented at the SETAC North America conference and only some figures were used in the "Scientific opinion on the science behind the development of a risk assessement of plant protection products on bees (Apis mellifera, Bombus spp. and solitary bees)" (EFSA, 2012) [2]. Only parts of the data from 2011 was presented in relation to the "Exposure of Coccinellidae to guttation droplets on maize seedlings with seed or granule treatment of neonicotinoids" (Schenke and Heimbach, 2014) [3]. The article describes the study sites, the variants of treated maize seeds, sample collection and the analytical methods used to quantify the neonicotinoids and relevant metabolites of IMD (5-OH-IMD and IMD-olefine) and of THM (CTN) in guttation drop samples. The complete field data set is publicly available at the Contents lists available at ScienceDirect
2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), 2012
ABSTRACT This work describes a framework for the elaboration and evaluation of management policie... more ABSTRACT This work describes a framework for the elaboration and evaluation of management policies for production and transportation supply chains in the forest product industry. The approach deals with the issue of coordination between the tactical and operational decision levels. First, we introduce LogiLab, a software system allowing to model the network and to optimize product flows in the supply chain. We than show how one can use this tactical aggregated plan to identify management policies that will guide day to day operations at the operational level. Finally, a discrete event simulation model allows assessing with more details what would be the impact of implementing these policies at the operational/execution level.
Computer Science & Information Technology ( CS & IT ), 2016
2020 International Wireless Communications and Mobile Computing (IWCMC), 2020
Technologies have become more reliable, more optimal, and less costly in terms of calculation, st... more Technologies have become more reliable, more optimal, and less costly in terms of calculation, storage and energy consumption. However, despite this success, due to the threat of cyber attacks, the security of Internet of Things (IoT) remains one of the major problems hampering the evolution and rapid deployment of this technology. This article consists of the creation of a security system to ensure the authentication services of connected objects, the integrity of the data exchanged between them and the confidentiality of information. This approach must take into account the constraints of the objects and communication technologies used. We have created a protocol which authenticates the object when it is associated and which protects the integrity of the data exchanged in unicast mode and subsequently improved in Broadcast mode. We try to design a secure multicast routing protocol Crypto-IoT that takes into account the constraints of the WSN and IoT. We evaluate the efficacy of ou...
Proceedings of the Euro American Conference on Telematics and Information Systems, 2018
The Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol is known as a pioneering protocol f... more The Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol is known as a pioneering protocol for distributed clustering. It is based on a probabilistic calculation to select cluster head. Successive LEACH protocols have involved other parameters for the selection of cluster head, such as residual energy, location, signal strength ... However, most of these protocols do not guarantee full coverage network for all cycles. Indeed, in some cycles, cluster head may be concentrated in a portion of the monitored area, some common nodes fail to reach a cluster head. They are considered orphans nodes in the network. After 100 rounds, the first dead nodes are the sensors of the clusters of low density. The major contribution of this article is to propose a solution to join the orphan nodes to the closest clusters and consequently to have a high connectivity rate of the nodes. The work in this thesis resulted in the design and development of a new distributed clustering protocol called high...
Proceedings of the 10th Euro-American Conference on Telematics and Information Systems, 2020
Advances in the world of embedded systems have fostered the emergence of intelligent objects know... more Advances in the world of embedded systems have fostered the emergence of intelligent objects known as the Internet of Things. These objects integrate, in a context of low energy consumption, a microcontroller making it possible to control a sensor and / or an actuator combined with a communication capability. The great power of the IoT lies in the fact that its objects communicate, analyze, process and manage data autonomously and without any human intervention. However, security issues are a major obstacle to the development and rapid deployment of this high technology. Safety is a balance between cost and benefit. The purpose of security is to make the cost of the attack too great for the expected gain. Finally, the proposed solution will be evaluated using Telosb sensors, comparison with the protocols KMMR and AODV. The performance results confirm we protocol Key Management Generation (KMG) is robust and efficient, provides a less consumption energy, fast calculation time, a good...
2021 18th International Multi-Conference on Systems, Signals & Devices (SSD), 2021
A Vehicular Ad Hoc Network is a dynamic network due to uncertain vehicles presence on the road an... more A Vehicular Ad Hoc Network is a dynamic network due to uncertain vehicles presence on the road and data transmission among vehicles and Road Side Unit (RSU). Efficient communication among the vehicles and RSUs is useful for the Intelligent Transportation System (ITS). There are two types of communication Vehicle 2 Vehicle (V2V), and Vehicle 2 Infrastructure (V2I) performs in VANET by mobile ad hoc technology. The communication performance of the VANET depends on the routing data. The routing protocols play an important role in efficient data routing in VANET. VANET routing protocols are reviewed, and clustering in VANET is introduced in this study. An extensive survey is carried out on various benchmark clustering algorithms designed by different researchers for Cluster Head (CH) selection. Various parameters for evaluating the performance in a network are compared and analyzed. Also, we introduce our proposed algorithm which aims to increase the reliability of VANET routing.
Wireless Sensor Networks (WSN) are generally battery-powered devices. As energy consumption incre... more Wireless Sensor Networks (WSN) are generally battery-powered devices. As energy consumption increases exponentially with communication distance, multi-hop routing is very advantageous to save energy and prolong network lifetime. For these reasons, we propose, in this paper, ML-LEACH (Multi-Level clustering for Low Energy Adaptive Clustering Hierarchy) protocol that partitions uniformly a large-scale network into different layers. The election of cluster heads is performed in each layer to keep coverage of the whole monitored network area. Cluster heads in each layer collaborate with the adjacent upper layer to transmit sensor's data to the base station. Accordingly, we build a multi-level hierarchy to reduce the communication distance between sensor nodes and better distribute the energy load among them especially when the density of network is higher. Simulation results show that the proposed ML-Leach protocol achieves significant improvements in term of energy consumption, cov...
ArXiv, 2016
The applications require coverage of the whole monitored area for long periods of time. Clusterin... more The applications require coverage of the whole monitored area for long periods of time. Clustering is a way to reduce communications, minimize energy consumption and organize messages among the cluster head and their members. The message exchange of communication and data transmission between the different sensor nodes must be minimized to keep and extended the lifetime of the network because of limited energy resources of the sensors. In this paper, we take into consideration the problem isolated nodes that are away from the cluster head (CH) and by consequence or CH is not within the reach from these nodes. To solve this problem, we propose O-LEACH (Orphan Low Energy Adaptive Clustering Hierarchy) a routing protocol that takes into account the orphan nodes. Indeed, a cluster member will be able to play the role of a gateway which allows the joining of orphan nodes. Our contribution is to election a cluster head that has enough energy for a better now to coordinate with these membe...
Wireless sensor networks are a new family of computer systems that can observe the world with unp... more Wireless sensor networks are a new family of computer systems that can observe the world with unprecedented resolution. These systems promise to revolutionize the field of environmental monitoring. However, for the large-scale deployment of sensor network, data security must be ensured. In this context, this paper aims to provide solutions to ensure the authentication of users before having access to services and data collected by the sensor network. In this paper, we seek to accelerate the computation of scalar multiplications by using the paralleling technique which consists in distributing the calculation into several independent tasks that can be processed simultaneously by different nodes. We try to design a secure multicast routing protocol Crypto-ECC that takes into account the constraints of the WSN. Finally, the proposed solution will be evaluated using Telosb sensors.
International Journal of High Performance Computing and Networking
Sensors are lightweight platforms, with limited computing power and energy reserves. However, our... more Sensors are lightweight platforms, with limited computing power and energy reserves. However, our article is all about creating a secure routing protocol that provides reliable communications. The crypto-ECC contributions seek to accelerate the computation of scalar multiplications by using the paralleling technique which consists of distributing the calculation into several independent tasks that can be processed simultaneously by different nodes. This submission tries to design a secure multicast new routing protocol crypto-ECC that allows the generation and management of cryptographic keys and that takes into account the constraints of the wireless sensor networks and internet of things. Finally, the proposed solution will be evaluated using Telosb sensors, in comparison with earlier work. Performance evaluation using the TOSSIM simulator shows that crypto-ECC is scalable, offers secure links, and provides excellent key connectivity.
2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR)
2021 International Wireless Communications and Mobile Computing (IWCMC)
Journal of Sensors
The emergence of IoT applications has risen the security issues of the big data sent by the IoT d... more The emergence of IoT applications has risen the security issues of the big data sent by the IoT devices. The design of lightweight cryptographic algorithms becomes a necessity. Moreover, elliptic curve cryptography (ECC) is a promising cryptographic technology that has been used in IoT. However, connected objects are resource-constrained devices, with limited computing power and energy power. Driven by these motivations, we propose and develop a secure cryptographic protocol called CoopECC which leverages the organization of IoT nodes into cluster to distribute the load of cluster head (CH) among its cluster members. This technique proves that it optimizes the resource consumption of the IoT nodes including computation and energy consumption. Performance evaluation, done with TOSSIM simulator, shows that the proposed protocol CoopECC outperforms the original ECC algorithm, in terms of computation time, consumed energy, and the network’s lifespan.
International Journal of High Performance Computing and Networking