Repository logo
Communities & Collections
All of DSpace
  • English
  • العربية
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Laouid, Abdelkader"

Filter results by typing the first few letters
Now showing 1 - 3 of 3
  • Results Per Page
  • Sort Options
  • No Thumbnail Available
    Item
    D-LPCN : a distributed least polar-angle connected node algorithm for finding the boundary of a wireless sensor network
    (Elsevier, 2017) Saoudi, Massinissa; Lalem, Farid; Bounceur, Ahcène; Euler, Reinhardt; Kechadi, M-Tahar; Laouid, Abdelkader; Bezoui, Madani; Sevaux, Marc
  • No Thumbnail Available
    Item
    A distributed security protocol designed for the context of Internet of Things
    (Association for Computing Machinery, 2018) Laouid, Abdelkader; Muath, AlShaikh; Lalem, Farid; Bounceur, Ahcène; Euler, Reinhardt; Bezoui, Madani; Aissaoua, Habib; Tari, Abdelkamel
    In the field of Internet of Things (IoT), many encryption protocols for distributed wireless communication technology have been proposed for use in various applications such as monitoring, healthcare, product management, workplace, home support and surveillance [1]. An IoT system can be looked at as a highly dynamic distributed and networked system composed of a large number of smart devices. In fact, such connected devices suffer from the limitation of resources in terms of computing, energy, bandwidth and storage. Hence, IoT application scenarios require methods to adapt to highly diverse contexts with different available resources and possibly dynamic environments. In this paper, we address these issues by proposing an efficient technique for data protection in the context of IoT. A distributed network architecture is used, where each node is in charge to deliver and/or forward data. The aim is to use efficient operations to protect the exchanged data. The proposed technique ensures the exchanged data to be effectively and securely controlled with a low overhead compared to the classical approaches. The proposed protocol shows its efficiency in terms of overhead, speed, energy and security measurements.
  • No Thumbnail Available
    Item
    DoTRo : a new dominating tree routing algorithm for efficient and Fault-Tolerant leader election in WSNs and IoT networks
    (IEEE, 2018) Bounceur, Ahcène; Bezoui, Madani; Lagadec, Loïc; Euler, Reinhardt; Laouid, Abdelkader; Hammoudeh, Mohammad

DSpace software copyright © 2002-2026 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify