Nabil Benamar

Learn More
This article presents a comprehensive survey of routing protocols proposed for routing in Vehicular Delay Tolerant Networks (VDTN) in vehicular environment. DTNs are utilized in various operational environments , including those subject to disruption and disconnection and those with high-delay, such as Vehicular Ad-Hoc Networks (VANET). We focus on a(More)
Delay Tolerant Networks (DTN) are utilized in various operational environments, including those subject to disruption and disconnection and those with high-delay, such as Vehicular ad-hoc Networks (VANET). Through relays and carry and forward, messages, in DTN, can be delivered to the destination without an end-to-end connection for delay-tolerant(More)
RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) is proposed by the ROLL working group at IETF. This protocol used in the Internet of Things is optimal for Low power and Lossy Networks (LLNs). However, the RPL network has some limits when the network is dense. In this paper we evaluate the performance of RPL in three different scenarios. We(More)
Nowadays, many researchers are interested in the concept of Internet of Things (IoT). IoT is evolving our knowledge and conception of the world. IoT aims to offer a common communication paradigm for all objects via the Internet and its protocols. For that reasons, it is being applied in all areas of life, such as environmental monitoring, healthcare,(More)
Mobility is the most issues for the majority of protocols including the RPL (IPv6 Routing Protocol for Low Power and Lossy Networks). RPL a routing protocol standardized by IETF is usually used in Internet of Things Technology. It is proposed to support communications in Low power and Lossy Networks (LLNs). However, mobility limits the use of RPL protocol(More)
We propose a public-key signature and encryption application which strongly relies on identity-based public-key cryptography. By alternately using obvious identity information like names and essential image data of the involved parties as public keys we preserve all advantages gained by identity-based public-key schemes, mainly including the absence of a(More)
Recent years have witnessed massive growth in the popularity of smart portable devices. These devices are fully powered with a number of network interfaces, such as Wi-Fi, Bluetooth, and 4G, etc., in order to facilitate connectivity and enable the realization of computing and reachability everywhere and all the time. However, in areas with degraded cellular(More)
Mobile IPv6 (MIPv6) was developed by the Internet Engineering Task Force to support the mobility service as wireless technologies have grown and many people are more and more using wireless networks during movements. MIPv6 has long been favored over Mobile IPv4 and it's a major solution to supply mobility services on the Internet and therefore it's proposed(More)