consultants

Abdelmadjid BOUABDALLAH Enseignant-chercheur

| GI - Génie Informatique | HEUDIASYC - Heuristique et Diagnostic des Systèmes Complexes

Book

“Adaptive Security in Dynamic Group Communications: Dynamics-aware key management and data origin authentication techniques for highly dynamic and large scale multi-party communications ”, num. 978-3639203745, VDM Verlag, October, 2009 ( Challal, Y. and Bouabdallah, A.)

Journal Papers

“Internet of Things Security: a top-down survey”,
Computer networks, 141: 199-221 (2018) Co-authors : Kouicem D-E, Lakhlef H.,

“Revocable Attribute-Based Access Control In Mutli-Autority Systems”
Journal of Network and Computer Applications (JNCA), Vol. 122, pp. 61-76, (2018); Co-authors : Imine Y. Lounis A.

“An energy efficient and QoS aware routing protocol for wireless sensor and actuator networks”,
International Journal of Electronics and Communications, Vol. 83, pp 193-203, (2018); Co-authors : Yahiaoui S., Omar M., Natalizio E., Challal Y.,

“Agent-based broadcast protocols for wireless heterogeneous node networks”,
Computer Communications , Vol. 115: 51-63 (2018) ; Co-authors : Lakhlef H., Raynal M., Bourgeois J.

“Adaptive and dual data-communication trust scheme for clustered wireless sensor networks”,
Telecommunication Systems , Vol. 65(4): 605-619 (2017) ; Co-authors : Talbi S., Koudil M., Benatchba K

“Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments ”,
Journal of Ambient Intelligence and Humanized Computing , To appear ; Co-authors : Mohammedi M, Omar M.,

“ Energy-efficient Mechanisms in Security of the Internet of Things: A survey”,
Computer Networks , Vol. 127: 173-189 (2017) ; Co-authors : Hellaoui H., Koudil M.,

“ A Trust-based Approach for Securing Data Communication in Delay Tolerant Networks”,
International Journal of Information and Computer Security , Vol. 9, Issue 4, 2017 ; Co-authors : Touazi D., Omar M., Bendib A.,

“An energy efficient and QoS aware routing protocol for wireless sensor and actuator networks ”,
International Journal of Electronics and Communications, , Vol. 37 Issue C, pp. 23-44 (Juin 2017) ; Co-authors : Yahiaoui S., Omar M., Natalizio E., Challal Y., to appear.

“QoS-based Routing in Wireless Body Area Networks: A Survey and Taxonomy ”,
Computing Journal , to appear ; Co-authors : Yessad N, Omar M., Tari A.,

“ A survey of energy-efficient human context recognition systems using wearable sensors for healthcare applications”,
Pervasive and Mobile Computing Journal , Vol. 37 Issue C, pp. 23-44 (Juin 2017) ; Co-authors : Rault T., Challal Y.,

“Game Theory Framework for MAC Parameter Optimization in Energy-Delay Constrained Sensor Networks”,
ACM Transactions on Sensor Networks , Vol. 12 Issue 2, 2016 ; Co-authors : Doudou, M., Barcelo-Ordina J., Djenouri, D., Garcia Vidal, Jorge, Badache, N.,

“Lightweight Sharing Scheme for Data Integrity Protection in WSNs”,
Wireless Personal Communications , 89(1): 211-226 (2016) ; Co-authors : Bouakkaz F., Omar M., Laib S., Guermouz L., Tari A.,

“Key Pre-Distributions From Graph-Based Block Designs”,
IEEE Sensors Journal, Vol. 16, Issue: 6, pp. 1842-1850, 2016 Co-authors : Ding Jie, Tarokh V.,

“Healing on the Cloud: Secure Cloud Architecture for Medical Wireless Sensor Networks”,
Future Generation Computer Systems (Elsevier), Vol. 55, pp. 266–277, 2016 ; Co-authors : Lounis A., Hadjidj A., Challal Y.,

“Reliable and energy aware query-driven routing protocol for wireless sensor networks”,
Annals of Telecommunications, 71(1-2): 73-85 (2016) ; Co-authors : Omar M., Yahiaoui S.,

“Lightweight Identity-based Authentication Protocol for Wireless Sensor Networks”,
International Journal of Information and Computer Security, Vol. 8, No. 2, (2016) ; Co-authors : Omar M, Ouada F-S., Tari K.,

“M2M Security: Challenges and Solutions”,
IEEE Computing surveys and tutorials, Issue 99, 2016, ; Co-authors : Barki A., Gharout S., Traore J.,

“Joint Connectivity-Coverage Temperature-Aware Algorithms for Wireless Sensor Networks”,
IEEE Transaction on parallel and Distributed Systems, Vol. 26, No. 7, 2015 ; Co-authors : Bachir A., Bechkit W., Challal Y.,

“Energy-Efficiency in Wireless Sensor Networks: a top-down review approach”,
Computer Networks, Vol. 67: pp. 104-122 (2014) ; Co-authors :Rault T., Challal Y.,

“Efficient QoS Provisioning at the MAC Layer in Heterogeneous Wireless Sensor Networks”,
Computer Communications (Elsevier), Vol. 43: pp. 16-30 (2014) ; Co-authors : Souil M., Kamal E. A.,

“Synchronous Contention-Based MAC Protocols for Delay-Sensitive Wireless Sensor Networks: A Review and Taxonomy”,
Journal of Network and Computer Applications, Volume 38, pp. 172–184, (2014) ; Co-authors : Doudou S., Djenouri D, Badache N,

“A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks”,
IEEE Transactions on Wireless Communications, 12(2): 948-959 (2013); Co-authors : Bechkit W., Challal Y., Tarokh V.

“Temperature-Aware Density Optimization for Low Power Wireless Sensor Networks”,
IEEE Communications Letters, 17(2): 325-328 (2013), Co-authors :Bachir, A. and Bechkit, W. and Challal, Y.

“Wireless Sensor Networks for Rehabilitation Applications : Challenges and Opportunities”,
Journal of Network and Computer Applications vol. 36, pp. 1-15, 2013, Co-authors :Hadjidj A., Souil, M., Challal Y., Owen H.,

” A New Class of Hash-Chain Based Key Pre-distribution Schemes for WSN“,
Computer Communications (Elsevier); 36(3): 243-255 (2013) Co-authors : Bechkit W., Challal Y.,

“An Efficient Key Management Scheme for Content Access Control for Linear Hierarchies”,
Computer networks (Elsevier), 56(8): 2107-2118, 2012, co-authors : H.Ragab Hassen, H. Bettahar, Y. Challal, .

“Adaptive Group Key Management Protocol for Wireless Communications”,
Journal of Universal Computer Science, Vol. 18, No. 6, pp. 874-899, 2012, co-authors :S. Gharout, Y. Challal, M. Achemlal .

“Certification-based trust models in mobile ad hoc networks: A survey and taxonomy”
Journal of Network and Computer Applications (Elsevier), Vol. 35, pp. 268-286, 2012, co-authors : M. Omar, Y. Challal, A.,

“A New Application-Level Multicast Technique for Stable, Robust and Efficient Overlay Tree Construction”
Computer networks (Elsevier), Vol. 55, pp. 3332-3350, 2011, co-authors : M. Al-Kubeily, H. Bettahar,

“A New Worm Propagation Threat in BitTorrent : Modeling and Analysis”,
Telecommunication Systems Journal (Springer) , vol. 2010, num. 45, pp. 95-109, (2010) , co-authors : S. Hattahet, Y. Challal,

“The Topology Change Attack: Threat and Impact” ,
Journal of Universal Computer Science, Vol. 15, No. 2, pp. 465-487 (2009), co-authors : M.A. Abdelouahab, M. Achemlal, S. Laniepce.

” Reliable and Fully Distributed Trust Model for Mobile Ad hoc Networks“,
Computer and Security Journal (Elsevier Publisher), V.28(3-4), pages:199-214. (2009) co-authors : O. Mawloud, Y. Challal,

” TKS: a transition key management scheme for secure application level multicast“,
International Journal of Security and Networks, Vol.4, No.4, pp.210-222 (2009), co-authors : M. Al-Kubeily, H. Bettahar,

“On Security issues in Embedded Systems: Challenges and Solutions ”, International
Journal of Information and Computer Security (Inderscience editor), Vol. 2, num. 2, pp. 140-174, (2008), . co-authors : L. Khelladi, Y. Challal, N. Badache

“Scalable Delay-constrained Multicast Group Key Management”,
International Journal of Network Security, Vol.7, No.2, PP.153–167, ( 2008) ; co-authors : S. Gharout, Y. Challal, Bettahar

“Adaptive clustering for scalable key management in dynamic group communication ”,
International Journal of Network Security, Vol. 3, num. 2, pp. 133-146, (2008) , co-co-authors : S. Gharout, Y. Challal,

“Key Management for Content Access Control in a Hierarchy”
Computer Networks, Elsevier, vol. 51, num. 11, pp. 3197-3219, (2007), co-authors : H.Ragab Hassen, H. Bettahar, Y. Challal,

” RLH: Receiver driven Layered Hash-chaining for multicast data origin authentication “,
Computer Communications Journal (Elsevier Publisher), Volume: 28 (7), pp.726-740, (2005). co-authors : Y. Challal, Y. Hinard

“Sender and Receiver Access Control to the Multicast Delivery Tree in Mobile IP Environment: A Survey”,
IEEE Communications surveys and Tutorials, Vol. 7, No. 2, (2005), co-authors : I. Romdhani, M. Kellil, H.Y. Lach, H. Bettahar

“H2A: Hybrid Hash-chaining scheme for Adaptive multicast source authentication of media-streaming ”,
Computers and Security (Elsevier Science Publisher, Vol. 24, Issue 1, (2005), co-authors : Y. Challal, H. Bettahar

“Leader election in oriented Star graphs”
Networks, Vol.47, (2005), co-authors : Shi W., Srimani P.K.

” A Scalable and Fault-Tolerant Group Key Management Protocols“,
Journal of high speed networks, vol. 13, no. 4, (2004), co-authors : Seba H., Badache N.

“SAKM: A Scalable and Adaptive Key Management Approach for Multicast Communications”,
ACM SIGCOMM Computer Communications Review , Vol. 34, Number 2, pages: 55:70, (2004). co-authors : Y. Challal, H. Bettahar

“A Taxonomy of Multicast Data Origin Authentication: Issues and Solutions”,
IEEE Communications Surveys and Tutorials , Volume: 6 Number: 3, (2004). co-authors : Y. Challal, H. Bettahar

” Mobile multicast communications :Chellenges and solutions “,
IEEE Communications surveys and Tutorials , Jan. 2004. co-authors : I. Romdhani, M. Kellil, H.Y. Lach, H. Bettahar

” Mutual exclusion in Ad'hoc networks: a survey “,
ACM Operating Systems Review , Vol. 38, N° 1, (2004) pp. 74-89. co-authors : M. Benchaiba, N. Badache, M. Ahmed Nasser

” Key management and multicast security : A survey “ (in french),
Annals of telecommunications 58, n°. 7-8, (2003), pp. 1090-1129. co-authors : Seba H., Badache N., Bettahar H., Tandjaoui D.

” A new approach for delay constraint routing “,
Computer Communications, Elsevier Science Publisher , vol. 25/18 pp. 1751-1764, (2002). co-authors : Bettahar H.

“GMRP: Problème Généralisé de Routage Multipoint ”,
Annals of telecommunications , T. 57, No. 9/10, (2002). co-author : Bettahar H.

” A distributed Token-based algorithm for the dynamic resource allocation problem “,
ACM Operating systems Review , Vol. 34, No. 3 (2000), pp. 60-68, co-authors : Laforest C..

” Embedding complete binary Trees into Star and Pancake networks “,
Theory of Computer Systems 31(1998), pp. 279-305. co-authors : Heydemann M-C, Opatrny J., Sotteau D.

“Edge deletion preserving the diameter of the hypercube” ,
Discrete Applied Mathematics , 63 (1995) pp. 91-95. co-authors :Delorme C., Djelloul S.

“On mutual exclusion in faulty distributed systems” ,
ACM Operating Systems Review , Vol. 28, N° 1, (1994) pp. 80-87.

“A fault-tolerant algorithm for the mutual exclusion in real-time distributed systems” ,
Journal of computing and Information , Vol. 1 N° 1 (1994), pp. 438-454. co-authors :König J.C., Yagoubi M.

“On the edge-forwarding Index problem of small graphs” ,
Networks , Vol. 23 (1993), pp. 249-255. co-author : Sotteau D.

“An improvement of the Maekawa's mutual exclusion algorithm to make it Fault-tolerant” ,
Parallel Processing Letters , Vol. 2 n° 2&3 (1992) pp. 283-290. co-authors :König J.C.,

International Conferences (Since 2000)

“An Efficient Architecture for Trust Management in IoE Based Systems of Systems”,
IEEE 13th System of Systems Engineering Conference (SoSE), Paris, 2018 ; co_authors :Kouicem D-E, Lakhlef H.,

“MASFOG: An Efficient Mutual Authentication Scheme For Fog Computing Architecture”
IEEE TrustCom, New-York, 2018 ; co_authors :Imine Y., Kouicem D-E, Lounis A.,

“Authenticated Network Coding for Software-Defined Named Data Networking”,
32-nd IEEE International Conference on Advanced Information Networking and Applications (AINA-2018), Kracow, Pologne, 2018 ; co_authors : Boussaha R., Challah Y.,

“Performance Specifications of Market Physiological Sensors for Efficient Driver Drowsiness Detection System”,
International Conference on Sensor networks (SENSORNETS '18), Funchal, Madeira, Portugal, 2018 ; co_authors :Doudou S.,

“Distributed Fine-Grained Secure Control of Smart Actuators in Internet of Things”,
15th IEEE International Symposium on Parallel and Distributed Processing with Applications (IEEE ISPA 2017), Guangzhou, Chine, 2017, co_authors : KouiceM D-E, Lakhlef H.,

“Immediate attribute revocation in decentralized attribute-based encryption access control”,
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17), Sydney, Australie, 2017 co_authors : Imine Y. Lounis A.,

“Secure and lightweight biometric-based remote patient authentication scheme for home healthcare systems”,
International Conference on Cloud Computing Technologies and Applications, Rabat, Maroc, 2017 ; co_authors : Mohammedi M., Omar M., Aitabdelmalek W., Mansouri A,

“Towards Authenticated Network Coding for Named Data Networking”,
25th International Conference on Software, Telecommunications and Computer Networks, , Split, Croatie, Sept. 2017 ; co_authors :Boussaha R., Challal Y., Bessedik M.,

“ABR: A new efficient attribute based revocation on access control system”,
13th International Wireless Communications and Mobile Computing Conference (IWCMC 2017), Valencia, Espagne, June 2017 ; co_authors :Imine Y. Lounis A.,

, “Providing Collision-Free and Conflict-Free Communication in General Synchronous Broadcast/Receive Networks”
IEEE International Conference on Advanced Information Networking and Applications (AINA'17), Taiwan, 2017 ; co_authors :Lakhlef H., Raynal M., Taïani F,

“EREAT: Efficient Route Estimation based-on Actuator Tracking for WSANs”
ACM BDAW '16: Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, Bulgaria, 2016 ; Co_authors :Boudrioua A., Yahiaoui S., Omar M.,

“TASIoT: Trust-based Adaptive Security in the IoT”,
IEEE LCN'2016 Dubai ; Co_authors : Hellaoui H., Koudil M.,

“Efficient QoS-aware Heterogeneous Architecture for Energy-Delay Constrained Wearable Sensor Networks”
IEEE WMNC'2016, Colmar ; Co_authors : Doudou S., Rault T.,

“Scalable multi-group key management for Advanced Metering Infrastructure”,
15th IEEE International Conference on Computer and Information Technology (CIT-2015) Liverpool, UK, Oct 2015 ; Co_authors : Benmalek M., Challal Y.,

“Adaptive Data-Communication Trust Mechanism for Clustered Wireless Sensor Networks”,
IEEE Globecom'2015 (Communications and Information System Security), San Diego, Dec 2015 ; Co_authors : Talbi S., Koudil M., Benatchba K.,

” ETTAF: Efficient Target Tracking and Filming with a Flying Ad Hoc Network“,
Proceedings of the International Workshop on Experiences with the Design and Implementation of Smart Objects, Paris, 2015 ; Co_authors : Zaouche L., Natalizio E.

“Trusted Execution Environment: What It Is, and What It Is Not”
14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Finland, 20-22 Aout, 2015 Co_authors :Sabt M, Achemlal M,

“The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation”,
30th International Information Security and Privacy Conference, Hamburg, Germany, 2015. IFIP SEC 2015, co_authors : Sabt M, Achemlal M,

“Temperature MAC Plug-in for Large Scale WSN”,
Ad-hoc and Sensor Networking Symposium (AHSN), IEEE ICC 2015 ; co-authors : Bechkit W., Malik B., challal Y.,

“Energy-efficient architecture for wearable sensor networks”,
Wireless days, Rio De Janeiro, Brasil, 2014, co-authors : Rault T, Challal Y., Marin F.,

“Context-aware energy-efficient wireless sensor architecture for body activity recognition”,
PerCom Workshops 2014, Co-authors : Rault T., Challal Y., Marin F.,

“C-CP-ABE: Cooperative Ciphertext Policy Attribute-Based Encryption for the Internet of Things”
International Conference on Advanced Networking, Distributed Systems and Applications (INDS'14), Bejaia, Algeria, 2014 ; co-authors : Touati L., Challal Y.,

“Multi-Actuators based Anycast Routing Protocol for Wireless Sensor and Actuator Networks”,
International Conference on Advanced Networking, Distributed Systems and Applications (INDS'14), Bejaia, Algérie, 2014 ; co-authors : Yahiaoui S., Omar M., Challal Y.,

“Multi-hop wireless charging optimization in Low-Power Networks”,
IEEE Globecom'13, Atlanta, co-authors : T. Rault, Y. Challal

” WSN Lifetime Optimization through Controlled Sink Mobility and Packet Buffering”,
IEEE GIIS'13, Trento, Italy, co-authors : T. Rault, Y. Challal

“Braided Disjoint Branch Routing Protocol For WSNs”,
International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2013), Compiègne, Oct. 2013, co-authors : A. Attir, A. Hadjidj, Y. Challal

“Sensor networks for emergency management”,
International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2013), Compiègne, Oct. 2013, co-authors : A. Lounis, A. Hadjidj, Y. Challal

“A Systemic Approach for IoT Security”,
DCOSS'13, Boston, co-authors : A. Riahi , Y. Challal, E. Natalizio, Z. Chtourou

“ Adaptive reliable routing protocol for WSNs”,
ICWMC'13, Nice, France, 2013, Best paper Awards, co-authors : N. Maalel , P. Roux , M. Kellil,

“Reliability for Emergency Applications in Internet of Things”,
IOT Worshop In Conjunction with DCOSS'13, Boston; co-authors : N. Maalel , P. Roux , M. Kellil,

“A Study of Wireless Sensor Networks for Urban Traffic Monitoring: Applications and Architectures”,
International Conference on Ambient Systems, Networks and Technologies, Halifax, Canada, June 2013 (ANT/SEIT 2013) ; co-authors : M.A. Kafi , Y. Challal , D. Djenouri , M. Doudou , N. Badache

“Secure and Scalable Cloud-based Architecture for e-Health Wireless sensor networks”,
IEEE ICCCN'2012, Embedded Systems, and Pervasive Computing Track (SEP); Co-authors : A.Lounis, A.Hadjidj, Y. Challal,

“A New Adaptive MAC Protocol with QoS support for Heterogeneous Wireless Sensor Networks',
IEEE ISCC'2012 , Co-authors : Souil, M., Rault T.,

“A New Scalable Key Pre-distribution Scheme for WSN”,
IEEE ICCCN'2012 Sensor networks, Embedded Systems, and Pervasive Computing Track (SEP) ; Co-authors : Bechkit W., Challal Y.,

” A New Weighted Shortest Path Tree for Convergecast Traffic Routing in WSN “,
IEEE ISCC'2012 ; Co-authors : Bechkit W., Koudil M , Challal Y., Souici B., Benatchba K.,

“A study of Wireless Sensor Network Architectures and Projects for Traffic Light Monitoring”,
3rd International Conference on Ambient Systems, Networks and Technologies August 27-29, 2012, Niagara Falls, Ontario, Canada ; Co-authors : M A Kafi, Y Challal, D Djenouri, N Badache,

'Slotted Contention-Based Energy-Efficient MAC Protocols in Delay-Sensitive Wireless Sensor Networks',
IEEE ISCC'2012 ; Co-authors : Doudou S., Djenouri D, Badache N,

“Fast Restoration Of Connectivity for Wireless Sensor Networks” ,
International Conference on Next Generation Wired/Wireless Networking (NEW2AN), St Petersbourg, Russia, 2012; Co-authors : Maalel N., Kellil M., Roux P.,

“Impact of Pseudonym Pre-computation and Pre-distribution in Hybrid Vehicular Networks”, (Poster)
ACM International Workshop on VehiculAr Inter-NETworking, Systems, and Applications (ACM VANET 2012) ; Co-authors : Benin J., Poumailloux, H. Owen

“Toward a High-Fidelity Wireless Sensor Network for Rehabilitation Supervision”.
36th Annual IEEE Conference on Local Computer Networks (LCN’2011). Bonn, Germany 2011, Co-authors : Hadjidj, A., Challal,

“Rehabilitation Supervision Using Wireless Sensor Networks”,
IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM 2011), Lucca, Italy, Co-authors : Hadjidj, A. A., Challal, Y.

“On QoS Provisioning in Context-Aware Wireless Sensor Networks for Healthcare”
IEEE ICCCN 2011/ Workshop on Context-aware QoS Provisioning and Management for Emerging Networks, Applications and Services, Hawai, USA, 2011, Co-authors : M. Souil,

” HDMRP : An Efficient Fault-Tolerant Multipath Routing Protocol for Heterogeneous Wireless Sensor Networks“,
7th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (Qshine 2010), Springer, Nov. 2010, Houston, Texas, USA, Co-authors : Hadjidj, A., Challal, Y

” Enhancing resilience of probabilistic key pre-distribution schemes for WSNs through hash chaining“,
17th ACM Conference on Computer and Communications Security (ACM CCS'2010), Oct. 2010, Chicago, USA, Co-authors : Bechkit W., Challal Y.,

“An Efficient and Highly Resilient Key Management Scheme for Wireless Sensor Networks”,
IEEE Conference on Local Computer (IEEE LCN 2010), Oct. 2010, Denver, Colorado, USA, Co-authors : Bechkit W., Challal Y.,

. “BiTIT: Throttling BitTorrent Illegal Traffic”,
IEEE International Symposium on Computers and Communications (IEEE ISCC'2010), Juin 2010, Riccione, Italy, Co-authors : Sinan Hatahet, S., Challal, Y.

“Key Management With Host Mobility in Dynamic Groups”,
ACM International conference on Security of information and network, (ACM SIN2010), Sept. 2010, Taganrog, Rostov-on-Don, Russia, Co-authors : Gharout, S., Kellil, M., Challal, Y,

“A cross-Layer Reputation System for Routing Non-Cooperation Effects Mitigation Within Hybrid Ad-Hoc Networks” ,
ACM International Wireless Communication &Mobile Computing Conference (IWCMC 2010), June 2010, Caen, France, Co-authors : Lanièpce S., Achemlal M., Lancieri L.

“Mitigating Routing Non-Cooperation Effects within hybrid Ad-Hoc Networks”,
International Conference on COMmunication Systems and NETworkS (COMSNETS 2009), Janv. 2009, Bangalor, India, co-authors : S. Lanièpce, M. Achemlal,

“BitTorrent Worm Sensor Network : P2P Worms Detection and Containment”
17 Euromicro International Conference on Parallel, Distributed, and network based Processing, (PDP 2009), fev. 2009, Weimar, Germany, co-authors : S. Hattahet, Y. Challal,

“A New Worm Propagation Threat in BitTorrent Modeling and Analysis”,
International Multiconference on Computer Science and Information Technology, Oct 2008, Wisla Poland, co-authors : S. Hattahet, Y. Challal,

“TCA : A Toplogy Change Attack in P2P networks”,
IFIP Networking, MWNS workshop, 2008, co-authors : M. Abdelouahab, H. Ragab, S. Laniepce, M. Achemlal,

“A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks”,
IEEE International Conference and Exebition on Next Generation Mobile Applications and services/ Workshop on Wireless and Mobile Security (WMS'08), Cardiff, GB, sep. 2008, co-authors : A. Babakhouya, Y. Challal,

” Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast Sessions“
International Conference on Information Assurance and Security (IAS08), 8-10 September, Naples, Italy,co-authors : M. Al-Kubeily, H. Bettahar,

“TLA: A Tow Level Architecture for Key Management in Wireless SensorNetworks”,
2nd International Conference on sensor Technologies and Applications, August 2008, Cap Esterel, France., co-authors : B. Maala, H. Bettahar

“HERO: Hierarchical key management protocol for heterogeneous wireless sensor networks”,
IFIP-WSAN’2008, Springer Verlag Volume 264/2008, co-authors :B. Maala, Y. Challal.

” A New and Efficient Key Management Scheme for Content Access Control within Tree Hierarchies“,
21st IEEE International Conference on Advanced Information Networking and Applications, Niagara Falls, Canada, may 2007, co-authors : H.Ragab Hassen, H. Bettahar,

“MDA-ALM: Membership Delay Aware Application-Level Multicast”,
IEEE International Global Information Infrastructure Symposium ( IEEE GIIS), July 2007, Marrakech, Morroco ; co-authors : M. Al-Kubeily, H. Bettahar,

“NetTRUST:mixed NETworks Trust infrastRUcture baSed on Threshold cryptography”,
IEEE Securecom'07(SECOVAL), 2007, Nice, France ; co-authors : O. Mawloud, Y. Challal

“Efficient Key Management Scheme for Secure Application Level Multicast”,
IEEE Symposium on Computers and Communications (IEEE ISCC'2007), July 2007, Aveiro, Portugal ; co-authors : Al-Kubeily, Bettahar

“SDV: a new approach to secure distance vector routing protocols”,
IEEE Securecom'06 (SECOVAL), 2006, co-authors : A Babakhouya, Y Challal, S Gharout,

“Adaptive Multicast Membership Management for Mobile Multicast Receivers”,
IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2006), Montreal, Canada, June 19-21, 2006, co-authors : I. Romdhani, J. Munoz, H. Bettahar,

“Hierarchical Home Agent Architecture for Mobile IP Communications”,
IEEE Symposium on Computers and Communications (IEEE ISCC'2006), co-authors : I. Romdhani, J. Munoz, H. Bettahar,

“Layered multicast data origin authentication and non-repudiation over lossy networks”,
IEEE Symposium on Computers and Communications (IEEE ISCC'2006), co-authors : Y. Hinard, Y. Challal, H. Bettahar,

“Transparent Handover for Mobile Multicast Sources ”,
5th International Conference on Networking, IEEE ICN'06, Mauritius, April 2006. co-authors : I. Romdhani, H. Bettahar,

” A novel approach in designing Multicast Content Distribution Networks”,
7th IEEE International Symposium on Computer Networks (ISCN 2006), Istanbul (Turquie), june 2006, co-authors : Y. Hinard, Y. Challal, H. Bettahar,

“Mobile Multicast Route Optimisation “,
IEEE International Conference on Communications ( IEEE ICC'2006), “Next Generation Mobile Networks” symposium , Istanbul, Turquie, June 2006, co-authors : I. Romdhani, J. Munoz, H. Bettahar,

” Hash-based hierarchical Key Distribution for Group Communication “,
INFOCOM 2005 (poster), Miami, USA, March 2005. ; co-authors : Ragab H., Bettahar H., Challal, Y.

” Hi-KD: An Efficient Key Management Algorithm for Hierarchical Group“,
IEEE/CREATENET International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecurComm'05), Athenes, Grèce, sep. 2005, ; co-authors : Ragab H., Bettahar H., Challal,

” Authenticast: a source authentication protocol for multicast flows and streams “,
International Conference on Information Security, Istanbul, June 2005. co-authors : Y. Challal

” A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks“,
IFIP/IEEE WONS 2005 (WirelessOn demand Network Systems and services), Switzerland, jan. 2005. Co-authors : A. Derhab, N. Badache,

“A2cast: an Adaptive source Authentication protocol for multiCAST streams”,
9th IEEE Symposium on Computers and Communications (IEEE ISCC'2004), Alexendia, Egypt, July 2004. Co-authors : Y. Challal, H. Bettahar ,

“Hybrid and Adaptive Hash-chaining scheme for datastreaming source authentication” ,
7th IEEE International Conference on High Speed networks and Multimedia (HSNMC04), Toulouse, July 2004, Co-authors : Y. Challal, H. Bettahar ,

“Performance Analysis of binding update in Mobile IP during Handoff” ,
7th IEEE International Conference on High Speed networks and Multimedia (HSNMC04), Toulouse, July 2004, Co-authors : D. Tandjaoui, N. Badache ,

” A Scalable and Adaptive Key Management Protocol for Group Communication“,
International Conference on Wired/Wireless Internet communications (WWIC'2004), Lecture Note in Computer Science (LNCS 2957), Frankfurt (Oder), Germany, Feb. 2004, Co-authors : Y. Challal, H. Bettahar ,

“Mobility-Aware Rendezvous Point For Mobile Multicast Sources”,
International Conference on Wired/Wireless Internet communications (WWIC'2004), Lecture Note in Computer Science (LNCS 2957), Frankfurt (Oder), Germany, Feb. 2004, co-authors : I. Romdhani, M. Kellil, H-Y. Lach, H. Bettahar,

“An efficient QoS Server selection protocol for duplicated layered multicast servers”,
IEEE International Conference on Information & Communication Technologies, Damascus, Syria, April 2004, co-authors : H. Bettahar, C. Arar,

“Increasing the robustness of initial key agreement with failure detectors”,
IEEE Globecom, San Francisco, USA, Dec. 2003, co-authors : Seba H., Badache N.

“EBM: Edge-Based Multicasting in DiffServ Networks”,
Fifth International Workshop on Networked Group Communications (NGC'03), Lecture Notes In Computer Sciences (Springer Verlag), Munich, Germany, Sep. 2003, co-authors : A. Striegel, H. Bettahar, G. Manimaran,

” Ensuring Fault-Tolerance in Group-Key Distribution using group characteristics“,
Trusted Internet Workshop HiPC'2003, Hyderabad, India, Dec. 2003. co-authors : Seba H., Badache N.

“A scalable and adaptive key management approach for group communication” ,
Sécurité et Architecture Réseaux (SAR'2003), Nancy-France, July 2003, co-authors : Challal Y., Bettahar H.

“Seamless intra-domain handoff using simultaneous bindings” ,
ACS/IEEE International Conference on Computer Systems and Applications, Tunisia, 2003, co-authors :

“Performance enhancement of smooth handoff in mobile IP by reducing packets disorder”,
8th IEEE symposium on Computers and communications (ISCC), Antalya, Turquie, June 2003. Co-authors : Tandjaoui, D., Badache, N., Bettahar H., Seba H.

” AKMP : An adaptive key management protocol for secure multicast“ ,
IEEE Intenational Conference on Computer Communications and Networks (ICCCN 2002), october 14-16, 2002, Miami, Florida, USA. co-authors : Bettahar H., Challal Y.,

” New algorithms for delay constrained multicast routing “,
IEEE Networks 2002, 26-29 July 2002, Atanta (USA). co-authors : Bettahar H.

“A Fault-Tolerant Route Establishment Protocol for IP Networks ”,
IEEE LANMAN 2002, Stockholm, August 11-14, 2002. co-authors : Beaujean C., Bettahar H., Srimani P.,

” An efficient all-to-all communication protocol in honeycomb network “,
International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 14 - 18 july 2002, San Diego (USA). co-authors :Myoupo, J.F., Seme D.,

” Toward a smooth handoff for TCP and real time applications in wireless networks “,
International Network Conference INC 2002, Playmouth, 16-18 July 2002. co-authors : Badache N., Bettahar H., Seba H.Tandjaoui D.

” An hybrid approach to group key management “,
International Network Conference INC 2002, Playmouth, 16-18 July 2002, co-authors : Badache N., Bettahar H., Seba H.Tandjaoui D.

” solving consensus problem in a dynamic group : an approach suitable for mobile environment“,
7 h IEEE International Symposium on Computers and Communications, Italy, July 2002. co-authors : Badache N., Seba H.,

” Fault-Tolerant Group Communication Service for Mobile Hosts “
International Conference on Communications in Computing (CIC 2002), Las Vegas, USA, 24-27 July 2002 . co-authors : Badache N., Seba H.

“A two levels failure detector Scheme for solving consensus in a mobile environment” ,
Asian International mobile computing conference, in cooperation with ACM Sigmobile, Langkawi, Malysia, may 2002. co-authors : Badache N., Seba H.,

” QoS routing Protocol for the generalized multicast routing problem (GMRP)“ ,
IEEE International Conference on Networking, ICN'01 Colmar, July 2001, co-author : Bettahar H.,

” A parametrized distributed unicast routing algorithm with end-to-end delay constraint “,
IEEE International Conference on Telecommunication, Bucharest, June 2001. Best Paper Award. co-author : Beaujean C., Bettahar H.,

” Leader election in wrapped butterfly networks “.
ParC0'2001, International Conference on Parallel Computing, Naples, Italy, Sep. 2001. co-authors : Tallia D., Srimani P.

” A simple resource reservation protocol for multicast communications “,
6 th IEEE symposium on Computers and communications (ISCC'01), Tunisia, July 2001. co-author : Bettahar H., Beaujean C.,Cateloin S.,

” Delay-Based routing Issue in IP networks “,
Networks 2000, Toronto (Canada), sep. 2000. co-author : Bettahar H., Beaujean C., Cateloin S., Gourdin E.,

“A Simple Resource Reservation Protocol for the Internet”,
IEEE International Conference on Computer Communication and Networks, Las Vegas(USA), Oct. 2000. co-author : Beaujeau C., Cateloin S.,

” Fault-tolerant Path Tree construction for multicast Routing in Mobile Networks “,
EuroPar-2000, Lecture Notes in Computer Science, Munich (Germany), Sep. 2000.co-authors : Gupta S., Srimani P.,

” A scalable Multicast protocol for delay-constrained shared multicast tree construction “,
4 th IEEE symposium on Computers and communications, Egypt, July1999. co-author : Bettahar H.,

” A Framework for a New Resource Reservation Protocol for the Internet “,
International Conference on Advanced Commumnications Technology, Korea, February 1999. co-author : Beaujeau C., Cateloin S.,

” Finding Euler tour in distributed networks “,
PDPTA, June 1999, Las Vegas (USA). co-authors : Hadim M.,
Abdelmadjid Bouabdallah

Contacts

Abdelmadjid Bouabdallah
Professeur

UTC - UMR 7253 Heudiasyc
57 Avenue de Landshut,
Compiègne, 60203

madjid.bouabdallah@hds.utc.fr
Retour