-
UWB patch antenna design and realization in the bandwidth 780 MHz to 4.22 GHz
Authors:
Chemseddine Benkalfate,
Mohammed Feham,
Achour Ouslimani,
Abed-Elhak Kasbari
Abstract:
The proposed UWB antenna covers mobile communications (GSM, EDG, UMTS(3G), LTE(4G)) and wireless networks (WIFI, WiMAX), within a theoretical bandwidth defined from 780MHz to 4.22GHz. The UWB antenna is designed and realized on a FR-4 substrate with an electrical permittivity of 4.4. It presents a 98.75% average analytical efficiency and an omnidirectional radiation within the previous bandwidth.…
▽ More
The proposed UWB antenna covers mobile communications (GSM, EDG, UMTS(3G), LTE(4G)) and wireless networks (WIFI, WiMAX), within a theoretical bandwidth defined from 780MHz to 4.22GHz. The UWB antenna is designed and realized on a FR-4 substrate with an electrical permittivity of 4.4. It presents a 98.75% average analytical efficiency and an omnidirectional radiation within the previous bandwidth. The impedance excitation port is fixed at 50 Ohm according with the SMA impedance used in the practical part. The measured results are in good agreement with those obtained using CST and ADS softwares. The measured bandwidth, defined from 980MHz to 4.2GHz, presents an efficiency of 94.14%. Furthermore, the practical radiation diagram and the excitation port impedance stay the same as that the simulation one.
△ Less
Submitted 25 May, 2022;
originally announced July 2022.
-
Substrate integrated waveguide power divider, circulator and coupler in [10-15] GHz band
Authors:
Bouchra Rahali Mohammed Feham
Abstract:
The Substrate Integrated Waveguide (SIW) technology is an attractive approach for the design of high performance microwave and millimeter wave components, as it combines the advantages of planar technology, such as low fabrication costs, with the low loss inherent to the waveguide solution. In this study, a substrate integrated waveguide power divider, circulator and coupler are conceived and opti…
▽ More
The Substrate Integrated Waveguide (SIW) technology is an attractive approach for the design of high performance microwave and millimeter wave components, as it combines the advantages of planar technology, such as low fabrication costs, with the low loss inherent to the waveguide solution. In this study, a substrate integrated waveguide power divider, circulator and coupler are conceived and optimized in [10-15] GHz band by Ansoft HFSS code. Thus, results of this modeling are presented, discussed and allow to integrate these devices in planar circuits.
△ Less
Submitted 10 April, 2014;
originally announced April 2014.
-
Geographic routing protocols for underwater wireless sensor networks:a survey
Authors:
Sihem Souiki,
Maghnia Feham,
Mohamed Feham,
Nabila Labraoui
Abstract:
Underwater wireless sensor networks (UWSN), similar to the terrestrial sensor networks, have different challenges such as limited bandwidth, low battery power, defective underwater channels, and high variable propagation delay. A crucial problem in UWSN is finding an efficient route between a source and a destination. Consequently, great efforts have been made for designing efficient protocols whi…
▽ More
Underwater wireless sensor networks (UWSN), similar to the terrestrial sensor networks, have different challenges such as limited bandwidth, low battery power, defective underwater channels, and high variable propagation delay. A crucial problem in UWSN is finding an efficient route between a source and a destination. Consequently, great efforts have been made for designing efficient protocols while considering the unique characteristics of underwater communication. Several routing protocols are proposed for this issue and can be classified into geographic and non-geographic routing protocols. In this paper we focus on the geographic routing protocols. We introduce a review and comparison of different algorithms proposed recently in the literature. We also presented a novel taxonomy of these routing in which the protocols are classified into three categories (greedy, restricted directional flooding and hierarchical) according to their forwarding strategies.
△ Less
Submitted 15 March, 2014;
originally announced March 2014.
-
Wireless sensor networks localization algorithms: a comprehensive survey
Authors:
Asma Mesmoudi,
Mohammed Feham,
Nabila Labraoui
Abstract:
Wireless sensor networks (WSNs) have recently gained a lot of attention by scientific community. Small and inexpensive devices with low energy consumption and limited computing resources are increasingly being adopted in different application scenarios including environmental monitoring, target tracking and biomedical health monitoring. In many such applications, node localization is inherently on…
▽ More
Wireless sensor networks (WSNs) have recently gained a lot of attention by scientific community. Small and inexpensive devices with low energy consumption and limited computing resources are increasingly being adopted in different application scenarios including environmental monitoring, target tracking and biomedical health monitoring. In many such applications, node localization is inherently one of the system parameters. Localization process is necessary to report the origin of events, routing and to answer questions on the network coverage,assist group querying of sensors. In general, localization schemes are classified into two broad categories: range-based and range-free. However, it is difficult to classify hybrid solutions as range-based or range-free. In this paper we make this classification easy, where range-based schemes and range-free schemes are divided into two types: fully schemes and hybrid schemes. Moreover, we compare the most relevant localization algorithms and discuss the future research directions for wireless sensor networks localization schemes.
△ Less
Submitted 14 December, 2013;
originally announced December 2013.
-
RSAED: Robust and Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Authors:
Omar Rafik Merad Boudia,
Mohamed Feham
Abstract:
Recently, secure in-network aggregation in wireless sensor networks becomes a challenge issue, there is an extensive research on this area due to the large number of applications where the sensors are deployed and the security needs. In the last few years, aggregation of encrypted data has been proposed in order to maintain secrecy between the sensors and the sink, so the end-to-end data confident…
▽ More
Recently, secure in-network aggregation in wireless sensor networks becomes a challenge issue, there is an extensive research on this area due to the large number of applications where the sensors are deployed and the security needs. In the last few years, aggregation of encrypted data has been proposed in order to maintain secrecy between the sensors and the sink, so the end-to-end data confidentiality is provided. However, the data integrity was not addressed. In this paper, we propose RSAED that allows integrity verification at intermediate nodes, ensures the base station to receive ciphertexts which come only from legitimate nodes and also improves the efficiency. Through implementation results, we evaluate our scheme using computation and communication overhead.
△ Less
Submitted 11 December, 2012;
originally announced December 2012.
-
Seamless Infrastructure independent Multi Homed NEMO Handoff Using Effective and Timely IEEE 802.21 MIH triggers
Authors:
Zohra Slimane,
Mohamed Feham,
Abdelhafid Abdelmalek
Abstract:
Handoff performance of NEMO BS protocol with existent improvement proposals is still not sufficient for real time and QoS-sensitive applications and further optimizations are needed. When dealing with single homed NEMO, handoff latency and packet loss become irreducible all optimizations included, so that it is impossible to meet requirements of the above applications. Then, How to combine the dif…
▽ More
Handoff performance of NEMO BS protocol with existent improvement proposals is still not sufficient for real time and QoS-sensitive applications and further optimizations are needed. When dealing with single homed NEMO, handoff latency and packet loss become irreducible all optimizations included, so that it is impossible to meet requirements of the above applications. Then, How to combine the different Fast handoff approaches remains an open research issue and needs more investigation. In this paper, we propose a new Infrastructure independent handoff approach combining multihoming and intelligent Make-Before-Break Handoff. Based on required Handoff time estimation, L2 and L3 handoffs are initiated using effective and timely MIH triggers, reducing so the anticipation time and increasing the probability of prediction. We extend MIH services to provide tunnel establishment and switching before link break. Thus, the handoff is performed in background with no latency and no packet loss while **pong scenario is almost avoided. In addition, our proposal saves cost and power consumption by optimizing the time of simultaneous use of multiple interfaces. We provide also NS2 simulation experiments identifying suitable parameter values used for estimation and validating the proposed model
△ Less
Submitted 9 July, 2012;
originally announced July 2012.
-
A New Architecture of a Ubiquitous Health Monitoring System: A Prototype Of Cloud Mobile Health Monitoring System
Authors:
Abderrahim Bourouis,
Mohamed Feham,
Abdelhamid Bouchachia
Abstract:
Wireless Body Area Sensor Networks (WBASN) is an emerging technology which uses wireless sensors to implement real-time wearable health monitoring of patients to enhance independent living. In this paper we propose a prototype of cloud mobile health monitoring system. The system uses WBASN and Smartphone application that uses cloud computing, location data and a neural network to determine the sta…
▽ More
Wireless Body Area Sensor Networks (WBASN) is an emerging technology which uses wireless sensors to implement real-time wearable health monitoring of patients to enhance independent living. In this paper we propose a prototype of cloud mobile health monitoring system. The system uses WBASN and Smartphone application that uses cloud computing, location data and a neural network to determine the state of patients.
△ Less
Submitted 31 May, 2012;
originally announced May 2012.
-
BSK-WBSN: Biometric Symmetric Keys to Secure Wireless Body Sensors Networks
Authors:
Samira Mesmoudi,
Mohammed Feham
Abstract:
The Wireless Sensors Network (WSN) is an emergent technology resulting from progress of various fields. Many applications of networks WSN are born. One of the applications which have an operational effectiveness relates to the field of health and allows a medical remote support. Miniature wireless sensors, strategically placed on the human body, create a Wireless Body Sensor Network (WBSN) which a…
▽ More
The Wireless Sensors Network (WSN) is an emergent technology resulting from progress of various fields. Many applications of networks WSN are born. One of the applications which have an operational effectiveness relates to the field of health and allows a medical remote support. Miniature wireless sensors, strategically placed on the human body, create a Wireless Body Sensor Network (WBSN) which allows supervising various essential biological signals (rate of heartbeat, pressure, etc). The sensitivity of medical information requires mechanisms of safety. This performance constitutes a challenge for WBSN because of their limitation in resources energy and data-processing. In this paper we propose a new approach to symmetric cryptographic key establishment, based on biometrics physiology. This approach takes into account WBSN constraints and its topology.
△ Less
Submitted 8 October, 2011;
originally announced October 2011.
-
Novel hybrid intrusion detection system for clustered wireless sensor network
Authors:
Hichem Sedjelmaci,
Mohamed Feham
Abstract:
Wireless sensor network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the most efficient security mechanisms to protect the network against malicious attacks or unaut…
▽ More
Wireless sensor network (WSN) is regularly deployed in unattended and hostile environments. The WSN is vulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the most efficient security mechanisms to protect the network against malicious attacks or unauthorized access. In this paper, we propose a hybrid intrusion detection system for clustered WSN. Our intrusion framework uses a combination between the Anomaly Detection based on support vector machine (SVM) and the Misuse Detection. Experiments results show that most of routing attacks can be detected with low false alarm.
△ Less
Submitted 12 August, 2011;
originally announced August 2011.
-
Secure and Robust IPV6 Autoconfiguration Protocol For Mobile Adhoc Networks Under Strong Adversarial Model
Authors:
Zohra Slimane,
Abdelhafid Abdelmalek,
Mohamed Feham,
Abdelmalik Taleb-Ahmed
Abstract:
Automatic IP address assignment in Mobile Ad hoc Networks (MANETs) enables nodes to obtain routable addresses without any infrastructure. Different protocols have been developed throughout the last years to achieve this service. However, research primarily focused on correctness, efficiency and scalability; much less attention has been given to the security issues. The lack of security in the desi…
▽ More
Automatic IP address assignment in Mobile Ad hoc Networks (MANETs) enables nodes to obtain routable addresses without any infrastructure. Different protocols have been developed throughout the last years to achieve this service. However, research primarily focused on correctness, efficiency and scalability; much less attention has been given to the security issues. The lack of security in the design of such protocols opens the possibility of many real threats leading to serious attacks in potentially hostile environments. Recently, few schemes have been proposed to solve this problem, but none of them has brought satisfactory solutions. Auto-configuration security issues are still an open problem. In this paper, a robust and secure stateful IP address allocation protocol for standalone MANETs is specified and evaluated within NS2. Our solution is based on mutual authentication, and a fully distributed Autoconfiguration and CA model, in conjunction with threshold cryptography. By deploying a new concept of joint IP address and public key certificate, we show that, instead of earlier approaches, our solution solves the problem of all possible attacks associated with dynamic IP address assignment in MANETs. The resulting protocol incurs low latency and control overhead
△ Less
Submitted 5 August, 2011;
originally announced August 2011.
-
Ubiquitous Mobile Health Monitoring System for Elderly (UMHMSE)
Authors:
Abderrahim Bourouis,
Mohamed Feham,
Abdelhamid Bouchachia
Abstract:
Recent research in ubiquitous computing uses technologies of Body Area Networks (BANs) to monitor the person's kinematics and physiological parameters. In this paper we propose a real time mobile health system for monitoring elderly patients from indoor or outdoor environments. The system uses a bio- signal sensor worn by the patient and a Smartphone as a central node. The sensor data is collected…
▽ More
Recent research in ubiquitous computing uses technologies of Body Area Networks (BANs) to monitor the person's kinematics and physiological parameters. In this paper we propose a real time mobile health system for monitoring elderly patients from indoor or outdoor environments. The system uses a bio- signal sensor worn by the patient and a Smartphone as a central node. The sensor data is collected and transmitted to the intelligent server through GPRS/UMTS to be analyzed. The prototype (UMHMSE) monitors the elderly mobility, location and vital signs such as Sp02 and Heart Rate. Remote users (family and medical personnel) might have a real time access to the collected information through a web application.
△ Less
Submitted 19 July, 2011;
originally announced July 2011.
-
A Light Weight Protocol to Provide Location Privacy in Wireless Body Area networks
Authors:
Mohammed Mana,
Mohammed Feham,
Boucif Amar Bensaber
Abstract:
Location privacy is one of the major security problems in a Wireless Body Area Networks (WBANs). An eavesdropper can keep track of the place and time devices are communicating. To make things even worse, the attacker does not have to be physically close to the communicating devices, he can use a device with a stronger antenna. The unique hardware address of a mobile device can often be linked to t…
▽ More
Location privacy is one of the major security problems in a Wireless Body Area Networks (WBANs). An eavesdropper can keep track of the place and time devices are communicating. To make things even worse, the attacker does not have to be physically close to the communicating devices, he can use a device with a stronger antenna. The unique hardware address of a mobile device can often be linked to the identity of the user operating the device. This represents a violation of the user's privacy. The user should decide when his/her location is revealed and when not. In this paper, we first categorize the type of eavesdroppers for WBANs, and then we propose a new scheme to provide the location privacy in Wireless Body Area Networks (WBANs).
△ Less
Submitted 16 March, 2011;
originally announced March 2011.
-
High Throughput of WiMAX MIMO OFDM Including Adaptive Modulation and Coding
Authors:
Hadj Zerrouki,
Mohamed Feham
Abstract:
WiMAX technology is based on the IEEE 802.16 specification of which IEEE 802.16-2004 and 802.16e amendment are Physical (PHY) layer specifications. IEEE 802.16-2004 currently supports several multiple-antenna options including Space-Time Codes (STC), Multiple-Input Multiple-Output (MIMO) antenna systems and Adaptive Antenna Systems (AAS). The most recent WiMAX standard (802.16e) supports broadba…
▽ More
WiMAX technology is based on the IEEE 802.16 specification of which IEEE 802.16-2004 and 802.16e amendment are Physical (PHY) layer specifications. IEEE 802.16-2004 currently supports several multiple-antenna options including Space-Time Codes (STC), Multiple-Input Multiple-Output (MIMO) antenna systems and Adaptive Antenna Systems (AAS). The most recent WiMAX standard (802.16e) supports broadband applications to mobile terminals and laptops. Using Adaptive Modulation and Coding (AMC) we analyze the performance of OFDM physical layer in WiMAX based on the simulation results of Bit Error Rate (BER), and data throughput. The performance analysis of OFDM PHY is done. In this paper, an extension to the basic SISO mode, a number of 2 by 2 MIMO extensions are analysed under different combinations of digital modulation (QPSK, 16QAM and 64QAM) and Convolutional Code (CC) with half, two-third and three quarter rated codes. The intent of this paper is to provide an idea of the benefits of multiple antenna systems over single antenna systems in WiMAX type deployments.
△ Less
Submitted 9 February, 2010;
originally announced February 2010.