Walid Abdallah

Learn More
In this paper, we investigate the effect of grooming segment-based traffic on statistical multiplexing gain using simplified edge-node models of Optical Burst Switching (OBS) networks. The objective is to multiplex different bursts on the same output wavelength in order to optimize the bandwidth utilization on the optical fiber. We introduce a particular(More)
—A major issue to secure wireless sensor networks is key distribution. Current key distribution schemes are not fully adapted to the tiny, low-cost, and fragile sensors with limited computation capability, reduced memory size, and battery-based power supply. This paper investigates the design of an efficient key distribution and management scheme for(More)
In this paper, we address the problem of routing and wavelength assignment (RWA) and optical grooming of data bursts in segment-based traffic of Optical Burst Switching (OBS) networks. This problem has been extensively treated in circuit based WDM networks, but not in the context of OBS networks. We propose a novel formulation of this problem and we develop(More)
In this paper, we address the problem of optical grooming of data bursts in segment-based traffic of Optical Burst Switching (OBS) networks. The objective is to aggregate in one burst, different overlapping sub-bursts that are transmitted to the same destination. This process is executed at the core node and is based on the availability of Virtual Optical(More)
Machine to Machine (M2M) communication is an emerging technology that allows dynamic configuration of networks connecting many heterogeneous devices. Machines are used to assess and monitor the environment conditions and exchange information in an autonomous fashion. In many critical applications, machines are located in hazardous and even hostile(More)
This paper discusses the use of lattice cryptography and chaotic maps to encrypt OCDMA-coded optical flows. Unlike existing approaches, which have mainly focused on optical components such as phase masks and delay lines, our cryptosystem encompasses a secure code construction process. In fact, assuming that a pair of bases (a public basis and a private(More)