Aref Meddeb

Affiliations:
  • University of Sousse, Tunisia


According to our database1, Aref Meddeb authored at least 84 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A secure lightweight mutual authentication scheme in Social Industrial IoT environment.
J. Supercomput., August, 2023

A dual-mode MAC protocol with service differentiation for industrial IoT networks using wake-up radio.
Ad Hoc Networks, April, 2023

An Effective Replica Node Detection Scheme in Internet of Things Networks.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Design of a Wearable Patch Antenna and Channel Modeling for Internet of Bodies Application.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Performance Evaluation of Path Loss Models for Internet of Wearable Things.
Proceedings of the International Conference on Innovations in Intelligent Systems and Applications, 2023

A Survey of Intrusion Detection-Based Trust Management Approaches in IoT Networks.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
CaWuQoS-MAC: Collision Avoidance and QoS Based MAC Protocol for Wake-Up Radio Enabled IoT Networks.
Proceedings of the Advanced Information Networking and Applications, 2022

Performance Analysis of Wake-Up Radio Based Protocols Considering Non-ideal Transmission Channel.
Proceedings of the Advanced Information Networking and Applications, 2022

Comparative Study of QoS-aware Network Coding Protocols in WSNs.
Proceedings of the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022

2021
Optimal server selection for competitive service providers in network virtualization context.
Telecommun. Syst., 2021

A new algorithm based CSP framework for RFID network planning.
J. Ambient Intell. Humaniz. Comput., 2021

Optimal traffic routing in the network virtualization context.
Int. J. Commun. Syst., 2021

2020
Survey and taxonomy of MAC, routing and cross layer protocols using wake-up radio.
J. Netw. Comput. Appl., 2020

Secure Fog-Based E-Learning Scheme.
IEEE Access, 2020

Performance Evaluation of Collision Avoidance Techniques using Wake-Up Radio in WSNs.
Proceedings of the 28th International Conference on Software, 2020

2019
A new variant of cuckoo search algorithm with self adaptive parameters to solve complex RFID network planning problem.
Wirel. Networks, 2019

An Optimized NS2 Module for UHF Passive RFID Systems.
J. Electron. Test., 2019

6LowPSec: An end-to-end security protocol for 6LoWPAN.
Ad Hoc Networks, 2019

SAMAFog: Service-Aware Mutual Authentication Fog-based Protocol.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

CASK: Conditional Authentication and Session Key Establishment In Fog-assisted Social IoT Network.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

2018
Spatially Enhanced Bags of Visual Words Representation to Improve Traffic Signs Recognition.
J. Signal Process. Syst., 2018

In-vehicle augmented reality TSR to improve driving safety and enhance the driver's experience.
Signal Image Video Process., 2018

Internet of Bikes: A DTN Protocol with Data Aggregation for Urban Data Collection.
Sensors, 2018

Driver information system: a combination of augmented reality, deep learning and vehicular Ad-hoc networks.
Multim. Tools Appl., 2018

In-vehicle augmented reality system to provide driving safety information.
J. Vis., 2018

IoB-DTN: A lightweight DTN protocol for mobile IoT applications to smart bike sharing systems.
Proceedings of the 2018 Wireless Days, 2018

Enhancing Guaranteed end-to-end delay in IEEE 802.15.4.
Proceedings of the International Conference on Smart Communications and Networking, 2018

For An Efficient Internet of Bikes: A DTN Routing Protocol Based On Data Aggregation Approach.
Proceedings of the 15th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, 2018

An Evaluation of UHF RFID Anti-Collision Protocols with NS2.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Slicing aware QoS/QoE in software defined smart home network.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Time Modeling with NS2 in UHF RFID Anti-Collision Protocols.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

Load Sharing Techniques for Server Selection in Network Virtualization.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

A Comparative Evaluation of the Performance of the Multi-hop IoB-DTN Routing Protocol.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018

2017
Optimal load balanced clustering in homogeneous wireless sensor networks.
Int. J. Commun. Syst., 2017

A secure electric energy management in smart home.
Int. J. Commun. Syst., 2017

Real-time watermarking algorithm of H.264/AVC video stream.
Int. Arab J. Inf. Technol., 2017

Driver information system: a combination of augmented reality and deep learning.
Proceedings of the Symposium on Applied Computing, 2017

Deep learning traffic sign detection, recognition and augmentation.
Proceedings of the Symposium on Applied Computing, 2017

Semantic recognition: unified framework for joint object detection and semantic segmentation.
Proceedings of the Symposium on Applied Computing, 2017

Algorithm for Readers Arrangement without Collision in RFID Networks.
Proceedings of the 18th International Conference on Parallel and Distributed Computing, 2017

IEEE 802.15.4 security sublayer for OMNET++.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

6LoWPAN multi-layered security protocol based on IEEE 802.15.4 security features.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Impact of server placement on routing performance in Network Virtualization.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Inter-vehicle video communications over Vehicular Ad Hoc Networks.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

In-vehicle cooperative driver information systems.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

A secure fog-based communication scheme.
Proceedings of the International Conference on Internet of Things, 2017

Enhanced Bags of Visual Words Representation Using Spatial Information.
Proceedings of the Image Analysis and Processing - ICIAP 2017, 2017

A global approach for the improvement of UHF RFID safety and security.
Proceedings of the 12th International Conference on Design & Technology of Integrated Systems In Nanoscale Era, 2017

Design optimization of delay-constrained routing in wireless sensor networks.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

Modelling of clustering with relay nodes in wireless sensor networks.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks.
Proceedings of the 8th International Conference on Ambient Systems, 2017

A Security Analysis of LOADng Routing Protocol.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

Resource Allocation Heuristics for Network Virtualization.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

A Privacy-Preserving Authentication Scheme in an Edge-Fog Environment.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2016
Internet of things standards: who stands out from the crowd?
IEEE Commun. Mag., 2016

A Survey on Intelligent MAC Layer Jamming Attacks and Countermeasures in WSNs.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

QoS LowPAN for Internet of Things.
Proceedings of the 13th International Conference on New Technologies for Distributed Systems, 2016

DEAR: Delay and Energy Aware Routing In Wireless Sensor Networks.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

Minimum energy multi-objective clustering model for Wireless Sensor Networks.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

Energy efficient security protocols for wireless sensor networks : SPINS vs TinySec.
Proceedings of the 2016 International Symposium on Networks, Computers and Communications, 2016

A Secure Routing Protocol Based on RPL for Internet of Things.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A broadcast authentication scheme in IoT environments.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
A robust video watermarking algorithm in H.264/AVC compressed domain.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Enhanced LEAP authentication delay for higher immunity against DoS attack.
Proceedings of the International Conference on Protocol Engineering, 2015

Augmented Reality Based Traffic Sign Recognition for Improved Driving Safety.
Proceedings of the Communication Technologies for Vehicles - 8th International Workshop, 2015

Integration of a robust watermark scheme in a high efficiency codec H.265/HEVC with capacity-quality-bitrate trade-off.
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015

Optimal number of cluster heads for random topology WSNs using the stable election protocol.
Proceedings of the Global Summit on Computer & Information Technology, 2015

A secure authentication mechanism for resource constrained devices.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2014
Simulated evolution based algorithm versus exact method for virtual private network design.
Proceedings of the 10th International Conference on Natural Computation, 2014

2013
On building multiple spanning trees and VLAN assignment in metro ethernet networks.
Networks, 2013

2011
Evolutionary algorithm for provisioning VPN trees based on pipe and hose workload models.
Proceedings of the Seventh International Conference on Natural Computation, 2011

2010
Building cost effective lower layer VPNs: The ILEC/CLEC dilemma.
Int. J. Commun. Syst., 2010

Internet QoS: Pieces of the puzzle.
IEEE Commun. Mag., 2010

An efficient source authentication scheme in wireless sensor networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

2009
Building cost effective lower layer VPNs: The ILEC/CLEC paradox.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Benefits of a pure layer 2 security approach in Metro Ethernet.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Optimal VPN design: The ILEC/CLEC dilemma.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

2008
Smart Spanning Tree Bridging for Metro Ethernets.
Proceedings of the LCN 2008, 2008

Smart Spanning Tree Bridging for Carrier Ethernets.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2006
Multiple Spanning Tree Generation and Mapping Algorithms for Carrier Class Ethernets.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Why ethernet WAN transport?
IEEE Commun. Mag., 2005

2004
Benefits of multicast traffic split routing in packet switched networks.
Proceedings of IEEE International Conference on Communications, 2004

Minimum cost optoelectronic networks: the optics/electronics tradeoff.
Proceedings of IEEE International Conference on Communications, 2004

2002
The impact of point-to-multipoint traffic concentration on multirate networks design.
IEEE/ACM Trans. Netw., 2002


  Loading...