Nabil Benamar

Learn More
This article presents a comprehensive survey of routing protocols proposed for routing in Vehicular Delay Tolerant Networks (VDTN) in vehicular environment. DTNs are utilized in various operational environments , including those subject to disruption and disconnection and those with high-delay, such as Vehicular Ad-Hoc Networks (VANET). We focus on a(More)
Delay Tolerant Networks (DTN) are utilized in various operational environments, including those subject to disruption and disconnection and those with high-delay, such as Vehicular ad-hoc Networks (VANET). Through relays and carry and forward, messages, in DTN, can be delivered to the destination without an end-to-end connection for delay-tolerant(More)
RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) is proposed by the ROLL working group at IETF. This protocol used in the Internet of Things is optimal for Low power and Lossy Networks (LLNs). However, the RPL network has some limits when the network is dense. In this paper we evaluate the performance of RPL in three different scenarios. We(More)
We propose a public-key signature and encryption application which strongly relies on identity-based public-key cryptography. By alternately using obvious identity information like names and essential image data of the involved parties as public keys we preserve all advantages gained by identity-based public-key schemes, mainly including the absence of a(More)
Mobility is the most issues for the majority of protocols including the RPL (IPv6 Routing Protocol for Low Power and Lossy Networks). RPL a routing protocol standardized by IETF is usually used in Internet of Things Technology. It is proposed to support communications in Low power and Lossy Networks (LLNs). However, mobility limits the use of RPL protocol(More)
Vehicular Delay-Tolerant Networks (VDTNs) are composed of mobile nodes (vehicles) that communicate with each other wirelessly and using store carry and forward paradigm to forward data despite intermittent connectivity. A serious threat against routing process in such context is the non-cooperation of nodes. Some of them misbehave because they are(More)