scispace - formally typeset
Search or ask a question
Author

Fatiha Djemili Tolba

Other affiliations: University of Upper Alsace
Bio: Fatiha Djemili Tolba is an academic researcher from University of Annaba. The author has contributed to research in topics: Energy consumption & Intrusion detection system. The author has an hindex of 6, co-authored 14 publications receiving 158 citations. Previous affiliations of Fatiha Djemili Tolba include University of Upper Alsace.

Papers
More filters
Proceedings ArticleDOI
26 Dec 2007
TL;DR: In the context of mobile ad hoc networks (MANETs) routing, a clustering algorithm called Connectivity, Energy and Mobility driven Clustering Algorithm (CEMCA) is proposed, which consists in appropriately choosing the cluster head to reduce routing overhead.
Abstract: In the context of mobile ad hoc networks (MANETs) routing, we propose a clustering algorithm called Connectivity, Energy and Mobility driven Clustering Algorithm (CEMCA). The aim of CEMCA consists in appropriately choosing the cluster head to reduce routing overhead. In order to reduce traffic and energy consumption, the control messages are sent only when needed, according to the speed of the node. Each node has a quality that indicates its suitability as a cluster head. This quality takes into account the node connectivity, battery energy and mobility. These parameters are very important for the stability of the cluster. Simulation experiments are carried out to validate our algorithm in terms of stability of the clusters and their members and the quality of the connectivity. The results are compared to a previous approach called Weight Clustering Algorithm (WCA) and they show that CEMCA is performing better.

51 citations

Proceedings ArticleDOI
16 Apr 2012
TL;DR: The main principle of the proposed architecture is based on the distribution which is achieved through the implementation of a local intrusion detection system on each network node, and the cooperation that is guaranteed by mobile and stationary agents' collaboration.
Abstract: In this paper we focus on intrusion detection in the mobile ad hoc networks (MANETs). Starting by an overview of the existing work in this field, and ending up with the proposal of a new distributed and cooperative architecture for intrusion detection. In order to overcome the weaknesses and flaws of the existing MANET intrusion detection systems (IDSs), this architecture integrates an agent-based detection process. So, the main principle of the proposed architecture is based on: (a) the distribution which is achieved through the implementation of a local intrusion detection system on each network node, and (b) the cooperation that is guaranteed by mobile and stationary agents' collaboration. In that way we were able to have an IDS with so many interesting features such as: flexibility, distribution and cooperation, autonomy, lightweight, reactivity and fault tolerance which are extremely desired for any MANET intrusion detection system.

30 citations

Proceedings ArticleDOI
25 Aug 2007
TL;DR: This work proposes a fully distributed clustering algorithm for mobile ad hoc networks in which the nodes can move at higher speeds and shows that optimal cluster head characteristics: connectivity, energy and mobility, lead to a stable topology in terms of reconfiguration frequency.
Abstract: The dynamic topology of ad hoc networks is an important issue on which a lot of research is carried out. Because of higher speeds of movement and networks of larger scale, the algorithms of auto-organization and clustering may be inefficient. Therefore, we propose a fully distributed clustering algorithm for mobile ad hoc networks in which the nodes can move at higher speeds. The main objectives of this algorithm consists in reducing the reconstruction of the topology and stabilizing it as a long time as possible. This clustering algorithm can be used by several routing algorithms for ad hoc networks. Under proper simulations, we show that optimal cluster head characteristics: connectivity, energy and mobility, lead to a stable topology in terms of reconfiguration frequency.

21 citations

09 Aug 2010
TL;DR: A simple and robust method for intrusion detection in computer networks based on principal component analysis (PCA) where each network connection is transformed into an input data vector and thus, detection is handled in a low dimensional space with high efficiency and low use of system resources.
Abstract: Nowadays Intrusion detection systems (IDS) are very important for every information technology company which is concerned with security and sensitive systems. Even if a lot of research was already done on this topic, the perfect IDS has still not been found and it stays a hot and challenging area in computer security research. This paper presents a simple and robust method for intrusion detection in computer networks based on principal component analysis (PCA) where each network connection is transformed into an input data vector. PCA is then employed to reduce the high dimensional data vectors and thus, detection is handled in a low dimensional space with high efficiency and low use of system resources. Our experiments with the KDD Cup 99 dataset, although not yet completed, have shown that this approach is promising in terms of detection accuracy. It is also effective to identify most known attacks as well as new attacks. However, a frequent update for both user profiles and attacks databases is crucial to improve the identification rates.

18 citations

Proceedings ArticleDOI
01 Nov 2013
TL;DR: A new clustering algorithm for mobile wireless sensor networks is proposed that outperforms the other algorithms in terms of network lifetime, energy consumption and efficiency.
Abstract: Clustering in wireless sensor networks is an important technique to improve routing, reduce the communication overhead in several cases and reduce the energy consumption. In this paper, we propose a new clustering algorithm for mobile wireless sensor networks. The objective of our proposed algorithm is improving the network stability and saving the energy consumption while keeping the network connectivity. This is realized by an adequate and adaptive choice of cluster-heads during the formation of cluster process. Simulations are carried out to evaluate the performance of our clustering algorithm by comparing its performance with those of previous works. The results of simulation demonstrate that our proposed clustering algorithm outperforms the other algorithms in terms of network lifetime, energy consumption.

11 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This survey provides a comprehensive discussion of all aspects of MAS, starting from definitions, features, applications, challenges, and communications to evaluation, and a classification on MAS applications and challenges is provided.
Abstract: Multi-agent systems (MASs) have received tremendous attention from scholars in different disciplines, including computer science and civil engineering, as a means to solve complex problems by subdividing them into smaller tasks. The individual tasks are allocated to autonomous entities, known as agents. Each agent decides on a proper action to solve the task using multiple inputs, e.g., history of actions, interactions with its neighboring agents, and its goal. The MAS has found multiple applications, including modeling complex systems, smart grids, and computer networks. Despite their wide applicability, there are still a number of challenges faced by MAS, including coordination between agents, security, and task allocation. This survey provides a comprehensive discussion of all aspects of MAS, starting from definitions, features, applications, challenges, and communications to evaluation. A classification on MAS applications and challenges is provided along with references for further studies. We expect this paper to serve as an insightful and comprehensive resource on the MAS for researchers and practitioners in the area.

290 citations

Proceedings ArticleDOI
01 Jan 2008
TL;DR: A novel power controlled MAC protocol based on SNR in mobile Ad hoc networks is presented and simulation results demonstrate that compared to the IEEE 802.11 MAC protocol, the proposed protocol can decrease the power consumption greatly, and improve the energy utilization of mobile terminals while maintaining the throughput performance.
Abstract: The mobile Nodes in wireless Ad hoc networks are fed by batteries,so the energy limitation has become a performance bottleneck for mobile ad hoc networks.IEEE 802.11 has been used as the current standard MAC protocol for ad hoc networks.However,it has not the ability of adjusting power level dynamically,which reduces the performance of network.Power control can enhance the power efficiency of nodes,reduce the interferer of neighbor nodes and improve the performance of network.A novel power controlled MAC protocol based on SNR in mobile Ad hoc networks is presented in this paper.Simulation results demonstrate that compared to the IEEE 802.11 MAC protocol,the proposed protocol can decrease the power consumption greatly,and improve the energy utilization of mobile terminals while maintaining the throughput performance.

188 citations

Journal ArticleDOI
TL;DR: A classification approach that hybridizes statistical techniques and SOM for network anomaly detection and Probabilistic Self-Organizing Maps (PSOM) aim to model the feature space and enable distinguishing between normal and anomalous connections.

151 citations

Journal ArticleDOI
TL;DR: A detailed review has been conducted on the current situation of malware infection and the work done to improve anti-malware or malware detection systems and provides an up-to-date comparative reference for developers of malware detection systems.
Abstract: Over the last decades, there were lots of studies made on malware and their countermeasures. The most recent reports emphasize that the invention of malicious software is rapidly increasing. Moreover, the intensive use of networks and Internet increases the ability of the spreading and the effectiveness of this kind of software. On the other hand, researchers and manufacturers making great efforts to produce anti-malware systems with effective detection methods for better protection on computers. In this paper, a detailed review has been conducted on the current situation of malware infection and the work done to improve anti-malware or malware detection systems. Thus, it provides an up-to-date comparative reference for developers of malware detection systems.

128 citations

Journal ArticleDOI
TL;DR: This paper surveys the existing work done to address various issues and challenges for solving the coverage and connectivity problems in WSNs and reviews a brief but complete overview of the various solutions of coverage problems in connected W SNs.
Abstract: Wireless Sensor Networks (WSNs) consist of several battery powered sensor nodes. The sensing coverage of the Field of Interest (FoI) is an important function of the sensor nodes in connected WSNs. A FoI is said to be covered if each point in the FoI is monitored by at least one sensor node. Due to small size, battery power supply, simple architecture, and light weight Operating System of the sensor nodes, maintaining the desired coverage of the FoI consists various issues and challenges in a connected WSN. This paper surveys the existing work done to address various issues and challenges for solving the coverage and connectivity problems in WSNs. Our discussion emphasis on sensing models, classification of coverage, research issues in WSNs and practical challenges in deployment of WSNs. We review a brief but complete overview of the various solutions of coverage problems in connected WSNs and describing insights into issues and challenges for research in this area.

119 citations