Abdelkader Laouid | Hamma Lakhdar El-Oued University (original) (raw)

Uploads

Papers by Abdelkader Laouid

Research paper thumbnail of An IoMT image crypto-system based on spatial watermarking and asymmetric encryption

Multimedia tools and applications, Jun 25, 2024

Research paper thumbnail of A Blind Digital Watermarking Approach Using Palmprint-Embedded Local Binary Patterns and Arnold Cat Map Transformations

Research paper thumbnail of Quantitative Scalability of Nodes and Geographical Coverage in LEACH Protocol

Research paper thumbnail of A P2P multi-path routing algorithm based on Skyline operator for data aggregation in IoMT environments

Research paper thumbnail of Efficient Leader Election in Wireless Sensor and IoT Networks

HAL (Le Centre pour la Communication Scientifique Directe), Jul 11, 2021

Research paper thumbnail of Bringing Coordination Languages Back to the Future Using Blockchain Smart Contracts

The 5th International Conference on Future Networks & Distributed Systems, Dec 15, 2021

This paper presents a blockchain extension of the run-time Sensing as a Service SOA (3SOA) approa... more This paper presents a blockchain extension of the run-time Sensing as a Service SOA (3SOA) approach presented in [5]. 3SOA defines a practical approach for implementing service-oriented Internet of Things (IoT) using coordination languages to integrate and program individual IoT objects to compose into full IoT system. We believe that the modularity, reuse, interoperability and portability of this model has much to offer, but that there exist some challenges in overcoming the performance issues inherent in the approach, and extending the range of applications to which it is suited. We are particularly interested in applying the coordination languages to decentralized systems. To this end, blockchain smart contracts are proposed to offer a decentralized trustable method to automatically verify compliance with pre-defined conditions before executing a transaction involving multiple parties. To validate our proposal, we demonstrate a healthcare functional prototypes as a proof of concept.

Research paper thumbnail of L'auto-structuration dans les réseaux de capteurs sans fil

Research paper thumbnail of A Dynamic Multipath Routing Algorithm for Energy Balancing in WSNs

HAL (Le Centre pour la Communication Scientifique Directe), Jun 8, 2016

International audienc

Research paper thumbnail of From Simulation to Digital Twins, the Case of Internet of Things Research and Tools

Proceedings of the 6th International Conference on Future Networks & Distributed Systems

Research paper thumbnail of Pelican Gorilla Troop Optimization Based on Deep Feed Forward Neural Network for Human Activity Abnormality Detection in Smart Spaces

IEEE Internet of Things Journal

Research paper thumbnail of A Novel Digital Signature Scheme for Advanced Asymmetric Encryption Techniques

Applied Sciences

Digital signature schemes are practical mechanisms for achieving message integrity, authenticity,... more Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove their robustness, but are unsuitable in several domains due to their computational complexity. Other asymmetric encryption schemes have been proposed to provide a cloud homomorphic encryption service, where the researchers focused only on how to ensure the homomorphic property. This paper proposes a new digital signature scheme dedicated to a family of encryption techniques. The proposal consists of two parts: the first focused on the secret key, and the second focused on the public key. Signature validity checking was performed by multiplying these two parts to reform again the sender’s public key, then comparing the result with the decrypted message. The validation of the decrypted message guarantees data integrity, where the sign...

Research paper thumbnail of Arabic Opinion Mining Using Machine Learning Techniques: Algerian Dialect as a Case of Study

Social networking services such as Facebook, Twitter, and YouTube are fertile ground for analyzin... more Social networking services such as Facebook, Twitter, and YouTube are fertile ground for analyzing texts, extracting opinions, and identifying feelings, due to the large number of texts and their diversity in all areas of life. In this manuscript, we apply four algorithms to classify tweets written in the Algerian dialect. To extract feelings, we used six features based on three polarities. In the presented work, we manually annotate a corpus of 2,891 texts and create an Algerian lexicon of idioms that contains 1328 annotated words. Our results show that there are improvements gained on the accuracy of the system, where we have achieved a better accuracy of 85.31%.

Research paper thumbnail of Secure Clock Synchronization Protocol in Wireless Sensor Networks

Cryptography helps solve many computer and communication problems, including clock synchronizatio... more Cryptography helps solve many computer and communication problems, including clock synchronization, where a group of nodes wants to agree on a theoretically unique clock in the system with the presence of malicious nodes trying to prevent the process of convergence; so we will need a set of mechanisms, including encryption. Many synchronization techniques suffer from high power consumption or vulnerability to attack or difficulty of implementation. In this article, we propose a synchronization protocol that contains two parts. The first part uses a lightweight linear scheme to encrypt clock messages to fend off certain types of attacks such as message manipulation. This scheme is suitable for Wireless sensor networks (WSNs) with negligible encryption and decryption time. The second part is the process of calculating the clock based on a very simple consensus algorithm. The study of the proposed protocol has shown very satisfactory results.

Research paper thumbnail of Machine Learning to Classify Religious Communities and Detect Extremism on Social Networks

International Journal of Organizational and Collective Intelligence

Religion is a source of mercy and peace; religious texts are one of the most critical parts of a ... more Religion is a source of mercy and peace; religious texts are one of the most critical parts of a culture's heritage, and they affect societies often in a big way; sadly, misconceptions can also make some religious people extremists. Modern social networks provide a platform for people to express themselves share their opinions and show their affiliations on many topics. This generates data in many forms like photos, videos, and texts. The authors used predefined machine learning (ML) to classify and analyze textual data from social networks. In this paper, they focus on two types of classification: religious and extremist. Extremism is independent of religious text, and therefore, they classify them separately. The work uses and compares several algorithms to classify textual data from social networks. The proposed model has achieved 93.33% accuracy for religious classification and 97% accuracy for extremism detection.

Research paper thumbnail of A Secure Multi-Agent-Based Decision Model Using a Consensus Mechanism for Intelligent Manufacturing Tasks

Accord is an important operation in the mechanism design for multi-agent systems and consequently... more Accord is an important operation in the mechanism design for multi-agent systems and consequently to applications built for these environments , such as ad hoc networks, virtual organizations, and decision-support tools for smart production systems. Much attention has been given to designing the process for resisting manipulation by strategic voting and decentralized control. The emphasis is on local decision-making based on locally available information and perception of events occurring locally. This manuscript presents a secure decision-support algorithm in a multi-agent system. The proposed consensus-based model serves multiple purposes in production planning and control, supply chain management , and product design and development. In particular, we describe decision-making, the selection of a leader, and the exploitation of limited resources. The importance of the proposal is to ensure robustness in a specific way; in which, decisions are carried out considering that the syste...

Research paper thumbnail of Proof of Chance: A Lightweight Consensus Algorithm for the Internet of Things

IEEE Transactions on Industrial Informatics

Research paper thumbnail of Semi-Decentralized Model for Drone Collaboration on Secure Measurement of Positions

The 5th International Conference on Future Networks & Distributed Systems

The importance of drone use is increasing in all fields due to several characteristics and advant... more The importance of drone use is increasing in all fields due to several characteristics and advantages they provide, such as saving lives, quality imaging, and being easily controllable. In addition, Unmanned Aerial Vehicle (UAV) prices are going to decrease, this has contributed greatly to an increase in demand for them. However, many challenges face the widespread use of UAVs. One of the most important challenges is his vulnerability to hacking. This paper presents a semi-decentralized collaboration model for the secure measurement of drone positions. The proposed model is based on choosing a leader for each specified period of time by a lightweight consensus algorithm. The leader gets his position using satellites, other drone team members are based on the leader’s safe position to find their locations in a way that is immune to GPS spoofing. Our proposal study shows the extent of the security level it provides against spoofing attacks.

Research paper thumbnail of An Optimized Scalable Multi-ant Colony System for Multi-depot Vehicle Routing Problems Using a Reactive Multi-agent System

WSEAS TRANSACTIONS ON SYSTEMS, 2021

The multi-depot vehicle routing problem is a variant of the vehicle routing problem that tries to... more The multi-depot vehicle routing problem is a variant of the vehicle routing problem that tries to minimize the total cost of providing the service from several depots to satisfy several client demands. This paper presents a multi-ant colony system to solve the multi-depot vehicle routing problem using a reactive agent-based approach. This approach is designed to effectively solve the problem, in which each reactive agent is inspired by modeling the behavior of the ant. We define two types of reactive agents whose behavior differs in the use of two kinds of pheromone trail. In order to refer to the two phases of the execution process, i.e., the assignment phase and the routing phase, every reactive agent cooperates with others to provide a scalable solution for the overall problem. The solution of the multi-depot vehicle routing problem is beneficial and helpful for many real applications. The performance evaluation of the proposed approach is done using instances from the literature...

Research paper thumbnail of Robust and Imperceptible Medical Image Watermarking Based on Dijkstra Algorithm

Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

Watermarking is the technique to prove the security aspects of the material. One of the main aspe... more Watermarking is the technique to prove the security aspects of the material. One of the main aspects in any watermarking method is the imperceptibly and the fidelity of the watermarked data. The place chosen for watermark embedding affects directly in the imperceptibility and fidelity characteristics. Choosing optimal area of embedding is still worrying issue. Robust watermarking approach is helpful for proving the intellectual ownership property rights. Moreover, medical image is very sensitive for any slight modification. However, spatial domain provides less complexity, but unfortunately less robustness comparing to frequency domain. We present through this paper, a watermarking approach in the spatial domain. Our approach investigated Dijkstra algorithm in order to find the optimal path of embedding data, where the Mean aspects can play a vital role in the algorithm. Our approach provides less complexity with high robustness regarding to the relevant existing approaches operating in spatial domain. Moreover, the approach provides watermark integrity aspects and ability to detect any tamper happening for the embedded watermark and moreover the ability to recover the attacked watermark.

Research paper thumbnail of Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol

Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, 2021

Research paper thumbnail of An IoMT image crypto-system based on spatial watermarking and asymmetric encryption

Multimedia tools and applications, Jun 25, 2024

Research paper thumbnail of A Blind Digital Watermarking Approach Using Palmprint-Embedded Local Binary Patterns and Arnold Cat Map Transformations

Research paper thumbnail of Quantitative Scalability of Nodes and Geographical Coverage in LEACH Protocol

Research paper thumbnail of A P2P multi-path routing algorithm based on Skyline operator for data aggregation in IoMT environments

Research paper thumbnail of Efficient Leader Election in Wireless Sensor and IoT Networks

HAL (Le Centre pour la Communication Scientifique Directe), Jul 11, 2021

Research paper thumbnail of Bringing Coordination Languages Back to the Future Using Blockchain Smart Contracts

The 5th International Conference on Future Networks & Distributed Systems, Dec 15, 2021

This paper presents a blockchain extension of the run-time Sensing as a Service SOA (3SOA) approa... more This paper presents a blockchain extension of the run-time Sensing as a Service SOA (3SOA) approach presented in [5]. 3SOA defines a practical approach for implementing service-oriented Internet of Things (IoT) using coordination languages to integrate and program individual IoT objects to compose into full IoT system. We believe that the modularity, reuse, interoperability and portability of this model has much to offer, but that there exist some challenges in overcoming the performance issues inherent in the approach, and extending the range of applications to which it is suited. We are particularly interested in applying the coordination languages to decentralized systems. To this end, blockchain smart contracts are proposed to offer a decentralized trustable method to automatically verify compliance with pre-defined conditions before executing a transaction involving multiple parties. To validate our proposal, we demonstrate a healthcare functional prototypes as a proof of concept.

Research paper thumbnail of L'auto-structuration dans les réseaux de capteurs sans fil

Research paper thumbnail of A Dynamic Multipath Routing Algorithm for Energy Balancing in WSNs

HAL (Le Centre pour la Communication Scientifique Directe), Jun 8, 2016

International audienc

Research paper thumbnail of From Simulation to Digital Twins, the Case of Internet of Things Research and Tools

Proceedings of the 6th International Conference on Future Networks & Distributed Systems

Research paper thumbnail of Pelican Gorilla Troop Optimization Based on Deep Feed Forward Neural Network for Human Activity Abnormality Detection in Smart Spaces

IEEE Internet of Things Journal

Research paper thumbnail of A Novel Digital Signature Scheme for Advanced Asymmetric Encryption Techniques

Applied Sciences

Digital signature schemes are practical mechanisms for achieving message integrity, authenticity,... more Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove their robustness, but are unsuitable in several domains due to their computational complexity. Other asymmetric encryption schemes have been proposed to provide a cloud homomorphic encryption service, where the researchers focused only on how to ensure the homomorphic property. This paper proposes a new digital signature scheme dedicated to a family of encryption techniques. The proposal consists of two parts: the first focused on the secret key, and the second focused on the public key. Signature validity checking was performed by multiplying these two parts to reform again the sender’s public key, then comparing the result with the decrypted message. The validation of the decrypted message guarantees data integrity, where the sign...

Research paper thumbnail of Arabic Opinion Mining Using Machine Learning Techniques: Algerian Dialect as a Case of Study

Social networking services such as Facebook, Twitter, and YouTube are fertile ground for analyzin... more Social networking services such as Facebook, Twitter, and YouTube are fertile ground for analyzing texts, extracting opinions, and identifying feelings, due to the large number of texts and their diversity in all areas of life. In this manuscript, we apply four algorithms to classify tweets written in the Algerian dialect. To extract feelings, we used six features based on three polarities. In the presented work, we manually annotate a corpus of 2,891 texts and create an Algerian lexicon of idioms that contains 1328 annotated words. Our results show that there are improvements gained on the accuracy of the system, where we have achieved a better accuracy of 85.31%.

Research paper thumbnail of Secure Clock Synchronization Protocol in Wireless Sensor Networks

Cryptography helps solve many computer and communication problems, including clock synchronizatio... more Cryptography helps solve many computer and communication problems, including clock synchronization, where a group of nodes wants to agree on a theoretically unique clock in the system with the presence of malicious nodes trying to prevent the process of convergence; so we will need a set of mechanisms, including encryption. Many synchronization techniques suffer from high power consumption or vulnerability to attack or difficulty of implementation. In this article, we propose a synchronization protocol that contains two parts. The first part uses a lightweight linear scheme to encrypt clock messages to fend off certain types of attacks such as message manipulation. This scheme is suitable for Wireless sensor networks (WSNs) with negligible encryption and decryption time. The second part is the process of calculating the clock based on a very simple consensus algorithm. The study of the proposed protocol has shown very satisfactory results.

Research paper thumbnail of Machine Learning to Classify Religious Communities and Detect Extremism on Social Networks

International Journal of Organizational and Collective Intelligence

Religion is a source of mercy and peace; religious texts are one of the most critical parts of a ... more Religion is a source of mercy and peace; religious texts are one of the most critical parts of a culture's heritage, and they affect societies often in a big way; sadly, misconceptions can also make some religious people extremists. Modern social networks provide a platform for people to express themselves share their opinions and show their affiliations on many topics. This generates data in many forms like photos, videos, and texts. The authors used predefined machine learning (ML) to classify and analyze textual data from social networks. In this paper, they focus on two types of classification: religious and extremist. Extremism is independent of religious text, and therefore, they classify them separately. The work uses and compares several algorithms to classify textual data from social networks. The proposed model has achieved 93.33% accuracy for religious classification and 97% accuracy for extremism detection.

Research paper thumbnail of A Secure Multi-Agent-Based Decision Model Using a Consensus Mechanism for Intelligent Manufacturing Tasks

Accord is an important operation in the mechanism design for multi-agent systems and consequently... more Accord is an important operation in the mechanism design for multi-agent systems and consequently to applications built for these environments , such as ad hoc networks, virtual organizations, and decision-support tools for smart production systems. Much attention has been given to designing the process for resisting manipulation by strategic voting and decentralized control. The emphasis is on local decision-making based on locally available information and perception of events occurring locally. This manuscript presents a secure decision-support algorithm in a multi-agent system. The proposed consensus-based model serves multiple purposes in production planning and control, supply chain management , and product design and development. In particular, we describe decision-making, the selection of a leader, and the exploitation of limited resources. The importance of the proposal is to ensure robustness in a specific way; in which, decisions are carried out considering that the syste...

Research paper thumbnail of Proof of Chance: A Lightweight Consensus Algorithm for the Internet of Things

IEEE Transactions on Industrial Informatics

Research paper thumbnail of Semi-Decentralized Model for Drone Collaboration on Secure Measurement of Positions

The 5th International Conference on Future Networks & Distributed Systems

The importance of drone use is increasing in all fields due to several characteristics and advant... more The importance of drone use is increasing in all fields due to several characteristics and advantages they provide, such as saving lives, quality imaging, and being easily controllable. In addition, Unmanned Aerial Vehicle (UAV) prices are going to decrease, this has contributed greatly to an increase in demand for them. However, many challenges face the widespread use of UAVs. One of the most important challenges is his vulnerability to hacking. This paper presents a semi-decentralized collaboration model for the secure measurement of drone positions. The proposed model is based on choosing a leader for each specified period of time by a lightweight consensus algorithm. The leader gets his position using satellites, other drone team members are based on the leader’s safe position to find their locations in a way that is immune to GPS spoofing. Our proposal study shows the extent of the security level it provides against spoofing attacks.

Research paper thumbnail of An Optimized Scalable Multi-ant Colony System for Multi-depot Vehicle Routing Problems Using a Reactive Multi-agent System

WSEAS TRANSACTIONS ON SYSTEMS, 2021

The multi-depot vehicle routing problem is a variant of the vehicle routing problem that tries to... more The multi-depot vehicle routing problem is a variant of the vehicle routing problem that tries to minimize the total cost of providing the service from several depots to satisfy several client demands. This paper presents a multi-ant colony system to solve the multi-depot vehicle routing problem using a reactive agent-based approach. This approach is designed to effectively solve the problem, in which each reactive agent is inspired by modeling the behavior of the ant. We define two types of reactive agents whose behavior differs in the use of two kinds of pheromone trail. In order to refer to the two phases of the execution process, i.e., the assignment phase and the routing phase, every reactive agent cooperates with others to provide a scalable solution for the overall problem. The solution of the multi-depot vehicle routing problem is beneficial and helpful for many real applications. The performance evaluation of the proposed approach is done using instances from the literature...

Research paper thumbnail of Robust and Imperceptible Medical Image Watermarking Based on Dijkstra Algorithm

Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

Watermarking is the technique to prove the security aspects of the material. One of the main aspe... more Watermarking is the technique to prove the security aspects of the material. One of the main aspects in any watermarking method is the imperceptibly and the fidelity of the watermarked data. The place chosen for watermark embedding affects directly in the imperceptibility and fidelity characteristics. Choosing optimal area of embedding is still worrying issue. Robust watermarking approach is helpful for proving the intellectual ownership property rights. Moreover, medical image is very sensitive for any slight modification. However, spatial domain provides less complexity, but unfortunately less robustness comparing to frequency domain. We present through this paper, a watermarking approach in the spatial domain. Our approach investigated Dijkstra algorithm in order to find the optimal path of embedding data, where the Mean aspects can play a vital role in the algorithm. Our approach provides less complexity with high robustness regarding to the relevant existing approaches operating in spatial domain. Moreover, the approach provides watermark integrity aspects and ability to detect any tamper happening for the embedded watermark and moreover the ability to recover the attacked watermark.

Research paper thumbnail of Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol

Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, 2021