Computer Science
Browse by
Recent Submissions
-
A Comprehensive Survey on Blockchain-Based C-ITS Applications: Classification, Challenges, and Open Issues
(ELSEVIER, 2023-05)Cooperative Intelligent Transport Systems (C-ITS) aim to improve road safety and provide comfort to both drivers and passengers by enabling vehicles, infrastructure, and other road users to exchange environmental and driving ... -
An Assessment Platform of Cybersecurity Attacks against the MQTT Protocol using SIEM
(IEEE Xplore, 2022-09)The industry of shared self-driving is increasingly interested in the Message Queuing Telemetry Transport (MQTT) solution to develop and evaluate their autonomous and shared mobility services. This solution would have the ... -
Attacks, Detection Mechanisms and Their Limits in Named Data Networking (NDN)
(Springer Link, 2022-07)Proposals for Information Centric Networking (ICN) have recently emerged to rethink the foundations of the Internet and design a native data-oriented network architecture. Among the current ICN projects, Named Data Networking ... -
Hybrid centralised MAC protocol for reliable broadcast of safety messages in vehicular ad hoc network
(Inderscience Publishers (IEL), 2018)Several medium access control (MAC) protocols were proposed to provide high-performance for vehicular ad hoc network (VANET). For instance, the contention-free MAC allows several vehicles to share the same communication ... -
Application of Rail Segmentation in the Monitoring of Autonomous Train’s Frontal Environment
(Springer Link, 2022-06)One of the key factors in achieving an autonomous vehicle is understanding and modeling the driving environment. This step requires a considerable amount of data acquired from a wide range of sensors. To bridge the gap ... -
Railset: A unique dataset for railway anomaly detection
(IEEE Xplore, 2022-12)Understanding the driving environment is one of the key factors in achieving an autonomous vehicle. In particular, the detection of anomalies in the traffic lane is a high priority scenario, as it directly involves vehicle's ... -
Impact Analysis of Greedy Behavior Attacks in Vehicular Ad hoc Networks
(IEEE Xplore, 2021-11)Vehicular Ad hoc Networks (VANETs), while promising new approaches to improving road safety, must be protected from a variety of threats. Greedy behavior attacks at the level of the Medium Access (MAC) Layer can have ... -
A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking
(MDPI, 2022-12)Despite the highly secure content sharing and the optimized forwarding mechanism, the content delivery in a Named Data Network (NDN) still suffers from numerous vulnerabilities that can be exploited to reduce the efficiency ... -
An Analytical Model of Bluetooth Performance Considering Physical and MAC Layers’ Effects
(IEEE Xplore, 2021-06)This paper presents an analytical model for the average Packet Error Rate (PER) of Bluetooth in Basic Rate (BR) mode. The effects of the physical layer and the MAC layer are taken into account. A Nakagami-m block fading ... -
A trust framework for centralized TDMA scheduling mechanism in Vehicular Ad hoc Networks
(IGI Global, 2020-10)Vehicular ad hoc networks, known as VANETs, are deployed to improve passenger comfort as well as to reduce the risk of road accidents by allowing vehicles to provide a warning in real time when a critical event is detected. ... -
A study on priority-based centralized tdma slot scheduling algorithm for vehicular ad hoc networks
(Gale, 2018-04)Vehicular Ad hoc NETworks, known as VANETs, are deployed to reduce the risk of road accidents as well as to improve passenger comfort by allowing vehicles to exchange different kinds of data. Medium Access Control protocols ... -
An optimized multi-hop broadcast scheme for mesh networks with node failures
(IEEE Xplore, 2018-08)The flooding scheme represents one of the fundamental operations in wireless mesh networks. It plays an important role in the design of network and application protocols. Many solutions have been studied to address flooding ... -
TDMA scheduling strategies for vehicular ad hoc networks: From a distributed to a centralized approach
(IEEE Xplore, 2018-09)Vehicular Ad hoc NETworks, known as VANETs, are deployed to reduce the risk of road accidents as well as to improve passenger comfort and safety by allowing vehicles to exchange different kinds of data. Medium Access Control ... -
A secure trust-aware cross-layer routing protocol for Vehicular Ad hoc Networks
(HAL open science, 2020)VANETs currently represent one of the most prominent solutions that aim to reduce the number of road accident victims and congestion problems while improving the quality of driving. VANETs form a very dynamic open network ... -
Performance Impact Analysis of Security Attacks on Cross-Layer Routing Protocols in Vehicular Ad hoc Networks
(IEEE Xplore, 2020-09)Recently, several cross-layer protocols have been designed for vehicular networks to optimize data dissemination by ensuring internal communications between routing and MAC layers. In this context, a cross-layer protocol, ... -
Using visible light links in combination with radio communication in a vehicular network
(IEEE Xplore, 2020-12)In VANET networks using TDMA access it is possible to approach the full capacity of the channel when the density of vehicles increases. When this occurs, some vehicles will be unable to communicate with the rest of the ... -
A Secure Data Storage in Multi-cloud Architecture Using Blowfish Encryption Algorithm
(Springer Link, 2022-03)In recent years, cloud computing has played an important role in accessing services around the world. Thanks to its rapid development in the IT industry it has gained huge appeal. It offers users the ability to store, ... -
A detection mechanism for cache pollution attack in named data network architecture
(Springer Link, 2022-03)Basic Named Data Networks (NDN) security mechanisms, rely on two main key features. The first one is the caching mechanism where it manages to minimize both the bandwidth usage and the data retrieval delay all along with ... -
A lightweight noise-tolerant encryption scheme for secure communication: An unmanned aerial vehicle application
(2022-09)In the modern era, researchers have focused a great deal of effort on multimedia security and fast processing to address computational processing time difficulties. Due to limited battery capacity and storage, Unmanned ... -
Security attacks impact for collective perception based roadside assistance: A study of a highway on-ramp merging case
(IEEE Xplore, 2020-06)Road critical situations like highway on-ramp merging require a high coordination level between vehicles within a short time while they are driving at high velocity. Augmented perception system that can provide information ... -
A game theory‐based route planning approach for automated vehicle collection
(Wiley Online Library, 2021-08)We consider a shared transportation system in an urban environment where human drivers collect vehicles that are no longer being used. Each driver, also called a platoon leader, is in charge of driving collected vehicles ... -
Physical and MAC layer design for active signaling schemes in vehicular networks
(IEEE Xplore, 2020-10)Nowadays, many telecommunication systems (wifi, cable systems and 4G, 5G cellular networks) use Orthogonal Frequency Division Multiplexing (OFDM) as the physical layer standard. The design of efficient OFDM signal detection ... -
An efficient cross-layer design for multi-hop broadcast of emergency warning messages in vehicular networks
(Springer Link, 2021-04)The main objective of Vehicular ad hoc networks (VANETs) is to make road transportation systems more intelligent in order to anticipate and avoid dangerous, potentially life-threatening situations. Due to its promising ... -
Cache pollution attacks in the NDN architecture: impact and analysis
(IEEE Xplore, 2021-09)Named Data Networking (NDN), one of the most suitable candidates for the future Internet architecture, allows all network nodes to have a local cache that is used to serve incoming content requests. Content caching is an ... -
Coexistence of IEEE 802.11 p and the TDMA-based AS-DTMAC Protocol
(IEEE Xplore, 2020-09)Advanced vehicular applications such as autonomous driving are leading to a new evolution in vehicular radio access technologies. The Task Group BD on the Next-Generation V2X (NGV) have defined IEEE 802.11bd as the new ... -
Evaluation of a new radio technology and visible light communication for a platooning application
(IEEE Xplore, 2021-10)The autonomous platoon is today one of the key tools for better road utilization. In fact, by optimizing the distance between vehicles, the air drag is reduced, and researchers have shown that 20% of energy can be saved ... -
Performance evaluation of an active signaling based time-slot scheduling scheme for connected vehicles
(Springer Link, 2021-06)Latency is a very important metric to be taken into account in the design of the Connected and Automated Driving (CAD) technology. Today, connected vehicles have a dedicated technology named vehicle-to-everything (V2X). ... -
Platoon Route Optimization for Picking up Automated Vehicles in an Urban Network
(IEEE Xplore, 2018-11)In this paper, we consider the problem of vehicle collection assisted by a fleet manager where parked vehicles are collected and guided by fleet managers. Each platoon follows a calculated and optimized route to collect ... -
Augmented Perception by V2X Cooperation (PAC-V2X): Security issues and misbehavior detection solutions
(IEEE Xplore, 2019-06)Cooperative Intelligent Transport System (C-ITS) also known as connected vehicle technology uses wireless technologies to enable real-time communication between vehicles moving along roads, traffic signals, infrastructure ... -
Design and optimization of access control protocols in Vehicular Ad Hoc Networks (VANETs)
(HAL, 2016-11)Road crashes and their damages represent a serious issue and are one of the main causes of people death. In this context, Vehicular Ad hoc NETworks (VANETs) are deployed to reduce the risk of road accident as well as to ... -
Hybridisation of genetic algorithms and tabu search approach for reconstructing convex binary images from discrete orthogonal projections
(Inderscience Online, 2014)In this paper, we consider a variant of the NP-complete problem of reconstructing HV-convex binary images from two orthogonal projections, noted by RCBI(H, V). This variant is reformulated as a new integer programming ... -
Optimized Trajectories of Multi-Robot Deploying Wireless Sensor Nodes
(IEEE Xplore, 2015)A main reason to the growth of wireless sensor networks deployed worldwide is their easy and fast deployment. In this paper we consider deployments assisted by mobile robots where static sensor nodes are deployed by mobile ... -
Combining genetic algorithm and simulated annealing methods for reconstructing HV-convex binary matrices
(Springer Link, 2013)In this paper, we consider the discret tomography problem (DTP), namely reconstruction convex binary matrices from their row and column sums respectively H and V, RBM(H,V). This is reformulated as an integer programming ... -
MAC-aware routing protocols for vehicular ad hoc networks: A survey
(IEEE Xplore, 2020-09)The constantly growing number of vehicles on our roads has become an increasing major cause of serious injury and death. Efficient data dissemination in Vehicular Ad hoc Networks (VANETs) inevitably requires an efficient ... -
UAVs trajectory optimization for data pick up and delivery with time window
(MDPI, 2021-04)Unmanned Aerial Vehicles (UAVs), also known as drones, are a class of aircraft without the presence of pilots on board. UAVs have the ability to reduce the time and cost of deliveries and to respond to emergency situations. ... -
An active signaling mechanism to reduce access collisions in a distributed TDMA based MAC protocol for vehicular networks
(Springer Link, 2020)A Vehicular Ad-Hoc NETwork (VANET) is an emerging technology consisting in a set of vehicles, mobile devices and an infrastructure, which uses wireless transmission technologies to enable real-time communication between ... -
Performance Evaluation of a TDMA-based Multi-hop Communication Scheme for Reliable Delivery of Warning Messages in Vehicular Networks
(IEEE Xplore, 2017)Vehicular Ad hoc NETworks, known as VANETs, are deployed to reduce the risk of road accidents as well as to improve passenger comfort by allowing vehicles to exchange different kinds of data, both between the vehicles ... -
An analytical model for performance analysis of an active signaling-based TDMA MAC protocol for vehicular networks
(IEEE Xplore, 2019-09)In Vehicular Ad hoc NETworks (VANETs) the vehicles moving along roads communicate with each other through ad hoc wireless devices. VANETs have attracted a great deal of attention in the research community in recent years, ... -
QCH-MAC: A Qos-aware centralized hybrid MAC protocol for vehicular ad hoc networks
(IEEE Xplore, 2018-05)The standard IEEE 802.11p was proposed to support the rapid exchange of data between the vehicles themselves and between the vehicles and the RSU (Road Side Unit). Besides, the Medium Access Control (MAC) protocols in ... -
An optimal strategy for collision-free slots allocations in vehicular ad-hoc networks
(Springer Link, 2015)Research in vehicular ad-hoc networks (VANETs) have attracted a lot of attention in the recent years as emerging wireless technologies have opened up the way to many new exciting applications. VANETs are highly dynamic ... -
A fully distributed tdma based mac protocol for vehicular ad hoc networks
(HAL open science, 2015-11)The Vehicular Ad-Hoc NETwork (VANET) consists of a set of vehicles moving on roads which can communicate with each other through ad hoc wireless devices. VANET has attracted a lot of attention in the research community in ... -
TDMA-aware Routing Protocol for Multi-hop Communications in Vehicular Ad Hoc Networks
(IEEE Xplore, 2017)Vehicular Ad-Hoc Networks (VANETs) have become an emerging technology due to the variety of their applications in Intelligent Transportation Systems (ITS). By creating a vehicular network, each vehicle can exchange information ... -
Using Road IDs to Enhance Clustering in Vehicular Ad hoc Networks
(IEEE Xplore, 2015)Vehicular ad hoc networks (VANETs) where vehicles act as mobile nodes is an instance of Mobile Ad hoc NET-works (MANETs), which are essentially developed for intelligent transportation systems. A challenging problem when ... -
An AdaptiveTDMA slot assignment strategy in vehicular ad hoc networks
(River Publishers, 2014-05)Improving road safety is among the main objectives of Vehicular Ad-hoc NETworks (VANETs) design. This objective would be achieved essentially by the use of efficient safety applications which should be able to wirelessly ... -
A Brief Summary of Cybersecurity attacks in V2X Communication
(OSF, 2022-07)Vehicles in the current era can communicate with other vehicles, roadside units, and networks. This communication is collaboratively called Vehicle to Everything (V2X) communication. V2X network leverages modern communication ... -
A novel angle-based clustering algorithm for vehicular ad hoc networks
(Springer Link, 2017)A vehicular ad hoc network (VANET) is a mobile network in which vehicles acting as moving nodes communicate with each other through an ad hoc wireless network. VANETs have become the core component of Intelligent Transportation ... -
A centralized TDMA based scheduling algorithm for real-time communications in vehicular ad hoc networks
(IEEE Xplore, 2016-09)As wireless technologies inside smart cars are increasing, Vehicular Ad hoc NETworks (VANETs) are becoming a promising way to enhance driver and passenger safety by enabling each vehicle to provide a warning in real time ... -
A Multi-Objectif Genetic Algorithm-Based Adaptive Weighted Clustering Protocol in VANET
(IEEE Xplore, 2015)Vehicular Ad hoc NETworks (VANETs) are a major component recently used in the development of Intelligent Transportation Systems (ITSs). VANETs have a highly dynamic and portioned network topology due to the constant and ... -
An infrastructure-free slot assignment algorithm for reliable broadcast of periodic messages in vehicular ad hoc networks
(IEEE Xplore, 2016-09)A Vehicular Ad-Hoc NETwork (VANET) consists of a set of vehicles moving along roads, which can communicate with each other through ad hoc wireless devices. VANETs have attracted a great deal of attention in the research ... -
TDMA-based MAC Protocols for Vehicular Ad Hoc Networks A Survey, Qualitative Analysis and Open Research Issues
(IEEE Xplore, 2015)Vehicular ad hoc networks (VANETs) have attracted a lot of attention in the research community in recent years due to their promising applications. VANETs help improve traffic safety and efficiency. Each vehicle can exchange ...