Security and Network Optimization and Management in Mobile/Vehicular Ad Hoc Systems

Introduction

The aim of this project is to address quality of service of QoS-OLSR routing protocol for Mobile and Vehicular Ad hoc Networks (MANET and VANET) taking into consideration selfish users that might over or under speed in order not to be selected as MPR. Mechanism design and repeated non-cooperative game theory were used to solve the aforementioned problems. We proposed a cooperative watchdog model that detects misbehaving vehicles by the means of Dempster Shafer (DS) theory. Collected evidences from all nodes are correlated to reach the final decision where in the literature the decisions used to be made based on one to one monitoring. Moreover, we had a novel contribution that is not only limited to VANET security but also to game theory. We have proposed a novel model to motivate nodes to behave normally after being selected as heads or MPRs. This is done by the means of Dempster Shafer Tit-for-Tat where in literature all the proposed Tit- for-Tat strategy depends on one-to-one monitoring to make the decision whether to cooperate or defect, while in our model evidences are correlated by the means of DS theory in order to reach the final decision

Contributions

FScaler: Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions pdf

Authors: Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabab Mizouni, Jamal Bentahar

AI-based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach Deep reinforcement Learning for proactive horizontal and vertical resource scaling. pdf

Authors: Hani Sami, Hadi Otrok, Jamal Bentahar, Azzam Mourad

Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement Deep Reinforcement Learning for Service Placement pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

Reinforcement R-learning Model for Time Scheduling of On-demand Fog Placement On-demand Fog Scheduling pdf

Authors: Peter Farhat, Hani Sami, Azzam Mourad

Vehicular-OBUs-As-On-Demand-Fogs: Resource and Context Aware Deployment of Containerized Micro-Services On-demand Vehicular Fog pdf

Authors: Hani Sami, Azzam Mourad, Wassim El-Hajj

Dynamic On-Demand Fog Formation Offering On-the-Fly IoT Service Deployment On-demand Fog Formation pdf

Authors: Hani Sami, Azzam Mourad

A survey on trust and reputation models for Web services: Single, composite, and communities pdf

Authors: Omar AbdelWahab, JamalBentahar, HadiOtrok, AzzamMourad

A Stackelberg game for distributed formation of business-driven services communities pdf

Authors: Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad

Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud pdf

Authors: Omar Abdel Wahab; Jamal Bentahar; Hadi Otrok; Azzam Mourad

Towards Trustworthy Multi-Cloud Services Communities: A Trust-Based Hedonic Coalitional Game pdf

Authors: Omar Abdel Wahab; Jamal Bentahar; Hadi Otrok; Azzam Mourad

An endorsement-based trust bootstrapping approach for newcomer cloud services pdf

Authors: Omar Abdel Wahab, Robin Cohen, Jamal Bentahar, Hadi Otrok,Azzam Mourad, Gaith Rjoub

Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection pdf

Authors: Azzam Mourad; Hanine Tout; Omar Abdel Wahab; Hadi Otrok; Toufic Dbouk

AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions pdf

Authors: Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabab Mizouni, Jamal Bentahar

VANET QoS-OLSR: QoS-based Clustering Protocol for Vehicular Ad Hoc Networks pdf

Authors: Omar Abdel Wahab, Hadi Otrok, Azzam Mourad

Reputation-based cooperative detection model of selfish nodes in cluster-based QoS-OLSR protocol. pdf

Authors: Nadia Moati · Hadi Otrok · Azzam Mourad · Jean-Marc Robert

CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks pdf

Authors: Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Jamal Bentahar

Towards Trustworthy Multi-Cloud Services Communities: A Trust-Based Hedonic Coalitional Game pdf

Authors: Omar Abdel Wahab; Jamal Bentahar; Hadi Otrok; Azzam Mourad

An endorsement-based trust bootstrapping approach for newcomer cloud services pdf

Authors: Omar Abdel Wahab, Robin Cohen, Jamal Bentahar, Hadi Otrok,Azzam Mourad, Gaith Rjoub

A novel aspect-oriented BPEL framework for the dynamic enforcement of web services security pdf

Authors: Azzam Mourad, Sara Ayoubi, Hamdi Yahyaoui, Hadi Otrok

New XACML-AspectBPEL approach for composite web services security pdf

Authors: Sara Ayoubi, Azzam Mourad, Hadi Otrok, Ahmad Shahin

Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies pdf

Authors: Hussein Jebbaoui, Azzam Mourad, Hadi Otrok, Ramzi Haraty

AOMD approach for context-adaptable and conflict-free Web-services composition pdf

Authors: Hanine Tout, Azzam Mourad, Chamseddine Talhi, Hadi Otrok

From model-driven specification to design-level set-based analysis of XACML policies pdf

Authors: AzzamMourad, Hanine Tout, Chamseddine Talhi, Hadi Otrok, Hamdi Yahyaoui

Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud pdf

Authors: Omar Abdel Wahab; Jamal Bentahar; Hadi Otrok; Azzam Mourad

An endorsement-based trust bootstrapping approach for newcomer cloud services pdf

Authors: Omar Abdel Wahab, Robin Cohen, Jamal Bentahar, Hadi Otrok,Azzam Mourad, Gaith Rjoub

Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach pdf

Authors: Bahia Halawi; Azzam Mourad; Hadi Otrok; Ernesto Damiani

Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection pdf

Authors: Azzam Mourad; Hanine Tout; Omar Abdel Wahab; Hadi Otrok; Toufic Dbouk

Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection pdf

Authors: Azzam Mourad; Hanine Tout; Omar Abdel Wahab; Hadi Otrok; Toufic Dbouk

FScaler: Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions pdf

Authors: Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabab Mizouni, Jamal Bentahar

AI-based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach Deep reinforcement Learning for proactive horizontal and vertical resource scaling. pdf

Authors: Hani Sami, Hadi Otrok, Jamal Bentahar, Azzam Mourad

Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement Deep Reinforcement Learning for Service Placement pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

Reinforcement R-learning Model for Time Scheduling of On-demand Fog Placement On-demand Fog Scheduling pdf

Authors: Peter Farhat, Hani Sami, Azzam Mourad

Vehicular-OBUs-As-On-Demand-Fogs: Resource and Context Aware Deployment of Containerized Micro-Services On-demand Vehicular Fog pdf

Authors: Hani Sami, Azzam Mourad, Wassim El-Hajj

Dynamic On-Demand Fog Formation Offering On-the-Fly IoT Service Deployment On-demand Fog Formation pdf

Authors: Hani Sami, Azzam Mourad

Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach pdf

Authors: Bahia Halawi; Azzam Mourad; Hadi Otrok; Ernesto Damiani

Sampling Online Social Networks with Tailored Mining Strategies Social Networks Analysis PDF

Authors: Mohamad Arafeh, Paolo Ceravolo, Azzam Mourad, Ernesto Damiani

Ontology Based Recommender System Using Social Network Data social network, data miner, big data, data analysis, data sampling, ontology, recommender system PDF

Authors: Mohamad Arafeh, Paolo Ceravolo, Azzam Mourad, Ernesto Damiani, Emanuele Bellini

Smart mobile computation offloading: Centralized selective and multi-objective approach pdf

Authors: Hanine Tout; Chamseddine Talhi; Nadjia Karaa; Azzam Mourad

Selective Mobile Cloud Offloading to Augment Multi-Persona Performance and Viability pdf

Authors: Hanine Tout; Chamseddine Talhi; Nadjia Kara; Azzam Mourad

A Stackelberg game for distributed formation of business-driven services communities pdf

Authors: Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad

Towards Trustworthy Multi-Cloud Services Communities: A Trust-Based Hedonic Coalitional Game pdf

Authors: Omar Abdel Wahab; Jamal Bentahar; Hadi Otrok; Azzam Mourad

A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond pdf

Authors: Sawsan Abdulrahman; Hanine Tout; Hakima Ould-Slimane; Azzam Mourad; Chamseddine Talhi; Mohsen Guizani

Internet of Things Intrusion Detection: Centralized, On-Device, or Federated Learning? pdf

Authors: Sawsan Abdul Rahman; Hanine Tout; Chamseddine Talhi; Azzam Mourad

FedMCCS: Multicriteria Client Selection Model for Optimal IoT Federated Learning pdf

Authors: Sawsan Abdulrahman; Hanine Tout; Azzam Mourad; Chamseddine Talhi

A Blockchain based Architecture for the Detection of Fake Sensing in Mobile Crowdsensing Crowdsensing, fake sensing, Blockchain, smart cities, citizens’ behavior monitoring PDF

Authors: Mohamad Arafeh, May El Barachi, Azzam Mourad, Fatna Belqasmi

FScaler: Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions pdf

Authors: Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabab Mizouni, Jamal Bentahar

AI-based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach Deep reinforcement Learning for proactive horizontal and vertical resource scaling. pdf

Authors: Hani Sami, Hadi Otrok, Jamal Bentahar, Azzam Mourad

Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement Deep Reinforcement Learning for Service Placement pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

Reinforcement R-learning Model for Time Scheduling of On-demand Fog Placement On-demand Fog Scheduling pdf

Authors: Peter Farhat, Hani Sami, Azzam Mourad

Vehicular-OBUs-As-On-Demand-Fogs: Resource and Context Aware Deployment of Containerized Micro-Services On-demand Vehicular Fog pdf

Authors: Hani Sami, Azzam Mourad, Wassim El-Hajj

Dynamic On-Demand Fog Formation Offering On-the-Fly IoT Service Deployment On-demand Fog Formation pdf

Authors: Hani Sami, Azzam Mourad

Stable federated fog formation: An evolutionary game theoretical approach Fog Federations

Authors: Ahmad Hammoud, Hadi Otrok, Azzam Mourad, Zbigniew Dziong

A Novel Federated Fog Architecture Embedding Intelligent Formation Fog Federations

Authors: Hala Shamseddine; Jana Nizam; Ahmad Hammoud; Azzam Mourad; Hadi Otrok; Haidar Harmanani; Zbigniew Dziong

Cloud federation formation using genetic and evolutionary game theoretical models Cloud Federations

Authors: Ahmad Hammoud, Azzam Mourad, Hadi Otrok, Omar Abdel Wahab, Haidar Harmanani

On the detection of passive malicious providers in cloud federations Cloud Federations

Authors: Ahmad Hammoud, Hadi Otrok, Azzam Mourad, Omar Abdel Wahab, Jamal Bentahar

A Blockchain based Architecture for the Detection of Fake Sensing in Mobile Crowdsensing Crowdsensing, fake sensing, Blockchain, smart cities, citizens’ behavior monitoring PDF

Authors: Mohamad Arafeh, May El Barachi, Azzam Mourad, Fatna Belqasmi

AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions pdf

Authors: Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabab Mizouni, Jamal Bentahar

FScaler: Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions pdf

Authors: Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabab Mizouni, Jamal Bentahar

AI-based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach Deep reinforcement Learning for proactive horizontal and vertical resource scaling. pdf

Authors: Hani Sami, Hadi Otrok, Jamal Bentahar, Azzam Mourad

Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement Deep Reinforcement Learning for Service Placement pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

Datasets

Dataset 1
Description + link
Dataset 1
Description + link
Dataset 1
Description + link