Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions, IEEE Communications Magazine, vol.52, issue.5, pp.86-92, 2014. ,
DOI : 10.1109/MCOM.2014.6815897
A comprehensive survey on vehicular Ad Hoc network, Journal of Network and Computer Applications, vol.37, pp.380-392, 2014. ,
DOI : 10.1016/j.jnca.2013.02.036
Wireless sensor networks: a survey, Computer Networks, vol.38, issue.4, pp.393-422, 2002. ,
DOI : 10.1016/S1389-1286(01)00302-4
Wireless sensor networks: a survey, Computer Networks, vol.38, issue.4, pp.393-422, 2002. ,
DOI : 10.1016/S1389-1286(01)00302-4
Energy-aware object tracking algorithm using heterogeneous wireless sensor networks, 2011 IFIP Wireless Days (WD), pp.1-6, 2011. ,
DOI : 10.1109/WD.2011.6098160
URL : https://hal.archives-ouvertes.fr/hal-00633034
Future Internet of Things: open issues and challenges, Wireless Networks, vol.6, issue.6, pp.2201-2217, 2014. ,
DOI : 10.1007/s11276-014-0731-0
A dynamic link adaptation algorithm for IEEE 802.11a wireless LANs, pp.1141-1145, 2003. ,
Adaptive Multirate Auto Rate Fallback Protocol for IEEE 802.11 WLANS, MILCOM 2006, 2006. ,
DOI : 10.1109/MILCOM.2006.302449
A rate-adaptive MAC protocol for multi-Hop wireless networks, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, 2001. ,
DOI : 10.1145/381677.381700
WaveLAN??-II: a high-performance wireless LAN for the unlicensed band, Bell Labs Technical Journal, vol.2, issue.3, pp.118-133, 1997. ,
DOI : 10.1002/bltj.2069
Mobile Relaying: Coverage Extension and Throughput Enhancement, IEEE Transactions on Communications, vol.58, issue.9, pp.2709-2717, 2010. ,
DOI : 10.1109/TCOMM.2010.080310.090199
Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.1987-1997, 2002. ,
DOI : 10.1109/INFCOM.2003.1209220
Vehicle Ad Hoc networks: applications and related technical issues, IEEE Communications Surveys & Tutorials, vol.10, issue.3, pp.74-88, 2008. ,
DOI : 10.1109/COMST.2008.4625806
URL : https://hal.archives-ouvertes.fr/hal-00930214
Securing vehicular communications -assumptions, requirements, and principles, WORKSHOP ON EMBEDDED SECURITY IN CARS (ESCAR), pp.5-14, 2006. ,
Challenges in securing vehicular networks, Workshop on Hot Topics in Networks (HotNets-IV), 2005. ,
GPSR, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.243-254, 2000. ,
DOI : 10.1145/345910.345953
A Survey of Localization in Wireless Sensor Network, International Journal of Distributed Sensor Networks, vol.1, issue.4, pp.1-12, 2012. ,
DOI : 10.1016/j.comnet.2011.06.023
Relative Fairness and Optimized throughput for Mobile Ad Hoc Networks, 2008 IEEE International Conference on Communications, 2008. ,
DOI : 10.1109/ICC.2008.426
URL : https://hal.archives-ouvertes.fr/hal-00680884
Rate adaptation scheme for IEEE 802.11-based MANETs, Journal of Network and Computer Applications, vol.39, issue.1, pp.126-139, 2014. ,
DOI : 10.1016/j.jnca.2013.05.013
URL : https://hal.archives-ouvertes.fr/hal-00828494
Coverage extension based on incentive scheduler for mobile relaying nodes in wireless networks, 2011 IEEE 36th Conference on Local Computer Networks, 2011. ,
DOI : 10.1109/LCN.2011.6115309
URL : https://hal.archives-ouvertes.fr/hal-00676756
Incentive Scheduler Algorithm for Cooperation and Coverage Extension in Wireless Networks, IEEE Transactions on Vehicular Technology, vol.62, issue.2, pp.797-808, 2013. ,
DOI : 10.1109/TVT.2012.2225855
URL : https://hal.archives-ouvertes.fr/hal-00740058
How MIMO cross-layer design enables QoS while detecting non-cooperative nodes in wireless multi-hop networks, Journal of Network and Computer Applications, vol.46, pp.395-406, 2014. ,
DOI : 10.1016/j.jnca.2014.07.011
URL : https://hal.archives-ouvertes.fr/hal-01024263
A Secure Mechanism Design-Based and Game Theoretical Model for MANETs, Mobile Networks and Applications, vol.22, issue.4, pp.191-204, 2010. ,
DOI : 10.1007/s11036-009-0164-7
URL : https://hal.archives-ouvertes.fr/hal-00619750
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2008. ,
DOI : 10.1109/WiMob.2008.77
URL : https://hal.archives-ouvertes.fr/hal-00680879
Modeling and performance evaluation of Advanced Diffusion with Classified Data in vehicular sensor networks, Wireless Communications and Mobile Computing, vol.3, issue.2-3, pp.1689-1701, 2011. ,
DOI : 10.1002/wcm.1220
URL : https://hal.archives-ouvertes.fr/hal-00680861
Advanced diffusion of Classified Data in Vehicular Sensor Networks, 2011 7th International Wireless Communications and Mobile Computing Conference, pp.777-782, 2011. ,
DOI : 10.1109/IWCMC.2011.5982645
URL : https://hal.archives-ouvertes.fr/hal-00620395
To send or to defer? Improving the IEEE 802.11p/1609.4 transmission scheme, Ad Hoc Networks, pp.1-11, 2015. ,
DOI : 10.1016/j.adhoc.2016.05.008
URL : https://hal.archives-ouvertes.fr/hal-01378043
L'instant propice à l'envoi d'un message sur la couche IEEE 802, UbiMob2014 : 10èmes journées francophones Mobilité et Ubiquité, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01139341
A Job Market Signaling Scheme for Incentive and Trust Management in Vehicular Ad Hoc Networks, IEEE Transactions on Vehicular Technology, vol.64, issue.8, pp.3657-3674, 2015. ,
DOI : 10.1109/TVT.2014.2360883
URL : https://hal.archives-ouvertes.fr/hal-01378052
DTM<sup>2</sup>: Adapting job market signaling for distributed trust management in vehicular ad hoc networks, 2013 IEEE International Conference on Communications (ICC), pp.1827-1832, 2013. ,
DOI : 10.1109/ICC.2013.6654786
Trust and exclusion in Vehicular Ad Hoc Networks: An economic incentive model based approach, 2013 Computing, Communications and IT Applications Conference (ComComAp), pp.13-18, 2013. ,
DOI : 10.1109/ComComAp.2013.6533601
URL : https://hal.archives-ouvertes.fr/hal-00788126
A trust-based architecture for managing certificates in vehicular ad hoc networks, 2012 International Conference on Communications and Information Technology (ICCIT), pp.180-185, 2012. ,
DOI : 10.1109/ICCITechnol.2012.6285787
URL : https://hal.archives-ouvertes.fr/hal-00709370
A distributed advanced analytical trust model for VANETs, IEEE GLOBECOM'2012, pp.219-224, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00724667
A secure cluster-based architecture for certificates management in vehicular networks, pp.665-683, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00822879
Advanced quality of services with security integration in wireless sensor networks, Wireless Communications and Mobile Computing, vol.11, issue.4, pp.1106-1116, 2015. ,
DOI : 10.1002/wcm.2562
URL : https://hal.archives-ouvertes.fr/hal-01099894
Security with Quality-of-Services optimization in Wireless Sensor Networks, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), pp.1319-1324, 2013. ,
DOI : 10.1109/IWCMC.2013.6583747
URL : https://hal.archives-ouvertes.fr/hal-00798088
EDES — Efficient dynamic selective encryption framework to secure multimedia traffic in Wireless Sensor Networks, 2012 IEEE International Conference on Communications (ICC), pp.1026-1030, 2012. ,
DOI : 10.1109/ICC.2012.6364221
Comparative analysis of RSSI-based indoor localization when using multiple antennas in Wireless Sensor Networks, 2013 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT), pp.146-151, 2013. ,
DOI : 10.1109/MoWNet.2013.6613811
URL : https://hal.archives-ouvertes.fr/hal-00831920
RSSI-based Localization Algorithms using Spatial Diversity in Wireless Sensor Networks, International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), vol.19, pp.3-4157, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-00977319
Time-bounded localization algorithm based on distributed Multidimensional Scaling for Wireless Sensor Networks, 2014 IEEE International Conference on Communications (ICC), pp.233-238, 2014. ,
DOI : 10.1109/ICC.2014.6883324
URL : https://hal.archives-ouvertes.fr/hal-00930123
DTA: Deployment and Tracking Algorithm in Wireless Multimedia Sensor Networks Ad hoc & sensor wireless networks, pp.115-135, 2015. ,
CTA: A collaborative tracking algorithm in wireless sensor networks, 2013 International Conference on Computing, Networking and Communications (ICNC), pp.529-534, 2013. ,
DOI : 10.1109/ICCNC.2013.6504141
URL : https://hal.archives-ouvertes.fr/hal-00733536
PMT<sup>2</sup>: A Predictive Mobile Target Tracking Algorithm in Wireless Multimedia Sensor Networks, 2014 IEEE Symposium on Computers and Communications (ISCC), pp.1-7, 2014. ,
DOI : 10.1109/ISCC.2014.6912601
PTA: A Predictive Tracking Algorithm in Wireless Multimedia Sensor Networks, Global Information Infrastructure Symposium, GIIS 2013, pp.1-6, 2013. ,
DOI : 10.1109/GIIS.2013.6684343
MIMODog: How to solve the problem of selfish misbehavior detection mechanism in MANETs using MIMO technology, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), 2012. ,
DOI : 10.1109/IWCMC.2012.6314226
URL : https://hal.archives-ouvertes.fr/hal-00687192
A dynamic link adaptation algorithm for ieee 802.11a wireless lans, Proceedings of IEEE International Conference on Communications (ICC'2003), 2003. ,
Performance analysis of the IEEE 802.11 distributed coordination function, IEEE Journal on Selected Areas in Communications, vol.18, issue.3, pp.535-547, 2000. ,
DOI : 10.1109/49.840210
Analysis of the increase and decrease algorithms for congestion avoidance in computer networks, Computer Networks and ISDN Systems, vol.17, issue.1, pp.1-14, 1989. ,
DOI : 10.1016/0169-7552(89)90019-6
Providing quality of service over a shared wireless link, IEEE Communications Magazine, vol.39, issue.2, pp.150-154, 2001. ,
DOI : 10.1109/35.900644
An OFDM-TDMA/SA MAC Protocol with QoS Constraints for Broadband Wireless LANs, Wireless Networks, vol.17, issue.10, pp.159-170, 2006. ,
DOI : 10.1007/s11276-005-5263-1
Space-mac: Enabling spatial reuse using mimo channel-aware mac, Proceedings of International Conference Communications (ICC), 2005. ,
Variable Accuracy of Matrix-Vector Products in Projection Methods for Eigencomputation, SIAM Journal on Numerical Analysis, vol.43, issue.3, pp.1155-1174, 2006. ,
DOI : 10.1137/040605333
Impact of denial of service attacks on ad hoc networks, IEEE/ACM Transactions on Networking (TON), issue.4, pp.791-802, 2008. ,
A Secure Architecture for Mobile Ad Hoc Networks, proceedings of International Conference MSN'06, pp.424-435, 2006. ,
DOI : 10.1007/11943952_36
URL : https://hal.archives-ouvertes.fr/hal-00680891
Microeconomic Theory, 1995. ,
Minimax Theorem, 1996. ,
DOI : 10.1007/978-1-4612-4146-1
Performance of Opportunistic Epidemic Routing on Edge-Markovian Dynamic Graphs, IEEE Transactions on Communications, vol.59, issue.5, pp.1259-1263, 2011. ,
DOI : 10.1109/TCOMM.2011.020811.090163
URL : https://hal.archives-ouvertes.fr/hal-01151852
Mobeyes: smart mobs for urban monitoring with a vehicular sensor network, IEEE Wireless Communications, vol.13, issue.5, pp.52-57, 2006. ,
DOI : 10.1109/WC-M.2006.250358
Telecommunications and Information Exchange Between Roadside and Vehicle Systems -5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Standard Specification, 2009. ,
Performance Evaluation of the IEEE 802.11p WAVE Communication Standard, 2007 IEEE 66th Vehicular Technology Conference, 2012. ,
DOI : 10.1109/VETECF.2007.461
Understanding the performance of shortlived control broadcast packets in 802.11p/wave vehicular networks, IEEE Vehicular Networking Conference (VNC'11), 2011. ,
Great expectations : the theory of optimal stopping, Boston [etc, 1971. ,
Markov decision processes: Lecture notes for stp 425, Stochastic Processes, 2012. ,
Wireless Lan Medium Access Control (MAC) and Physical layer (PHY) specifications, Amendment 8: Medium Access Control (MAC) Quality of Service Enhancements, 2005. ,
Chapter 8 Markov decision processes, Handbooks in Operations Research and Management Science, pp.331-434, 1990. ,
DOI : 10.1016/S0927-0507(05)80172-0
On the Impact of Multi-Channel Technology on Safety-Message Delivery in IEEE 802.11p/1609.4 Vehicular Networks, 2012 21st International Conference on Computer Communications and Networks (ICCCN), pp.1-8, 2012. ,
DOI : 10.1109/ICCCN.2012.6289273
Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.14, issue.2, pp.279-298, 2012. ,
DOI : 10.1109/SURV.2011.042711.00083
LFTM, linguistic fuzzy trust mechanism for distributed networks, Concurrency and Computation: Practice and Experience, vol.50, issue.4, pp.2007-2027, 2012. ,
DOI : 10.1002/cpe.1825
Situation-aware trust architecture for vehicular networks, IEEE Communications Magazine, vol.48, issue.11, pp.128-135, 2010. ,
DOI : 10.1109/MCOM.2010.5621979
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks, Journal of Network and Computer Applications, vol.35, issue.3, pp.934-941, 2012. ,
DOI : 10.1016/j.jnca.2011.03.028
A Privacy-Preserving Trust Model for VANETs, 2010 10th IEEE International Conference on Computer and Information Technology, pp.832-837, 2010. ,
DOI : 10.1109/CIT.2010.157
Signaling games, Computational Complexity Theory, Techniques, and Applications, pp.2830-2844, 2012. ,
Robust cooperative trust establishment for manets, ACM SASN, 2006. ,
LFTM, linguistic fuzzy trust mechanism for distributed networks, Concurrency and Computation: Practice and Experience, vol.50, issue.4, pp.2007-2027, 2012. ,
DOI : 10.1002/cpe.1825
A collaborative tracking algorithm for communicating target in Wireless Multimedia Sensor Networks, 2014 7th IFIP Wireless and Mobile Networking Conference (WMNC), pp.1-7, 2014. ,
DOI : 10.1109/WMNC.2014.6878883
URL : https://hal.archives-ouvertes.fr/hal-00962257
A survey on wireless multimedia sensor networks, Computer networks, vol.51, issue.4, pp.921-960, 2007. ,
BorderSense: Border patrol through advanced wireless sensor networks, Ad Hoc Networks, vol.9, issue.3, pp.468-477, 2011. ,
DOI : 10.1016/j.adhoc.2010.09.008
An architecture for differentiated service. United States, 1998. ,
An economic model for the radio resource management in multimedia wireless systems, Computer Communications, vol.27, issue.11, pp.27-1056, 2003. ,
DOI : 10.1016/j.comcom.2004.01.011
Hmac: Keyed-hashing for message authentication. United States, 1997. ,
Resilient localization for sensor networks in outdoor environments, ACM Transactions on Sensor Networks, vol.7, issue.1, pp.1-30, 2010. ,
DOI : 10.1145/1806895.1806898
Dv based positioning in ad hoc networks, Telecommunication Systems, vol.22, issue.1-4, pp.267-280, 2003. ,
Precise self-calibration of ultrasound based indoor localization systems, 2011 International Conference on Indoor Positioning and Indoor Navigation, pp.1-8, 2011. ,
DOI : 10.1109/IPIN.2011.6071920
Time-Bounded Essential Localization for Wireless Sensor Networks, IEEE/ACM Transactions on Networking, vol.21, issue.2, pp.400-412, 2013. ,
DOI : 10.1109/TNET.2012.2200107
Sensor deployment and target localization based on virtual forces, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), 2003. ,
DOI : 10.1109/INFCOM.2003.1208965
Indoor location system based on ZigBee devices and Metric Description Graphs, 2011 IEEE 7th International Symposium on Intelligent Signal Processing, 2011. ,
DOI : 10.1109/WISP.2011.6051706
Range-free localization using expected hop progress in wireless sensor networks. Parallel and Distributed Systems, IEEE Transactions on, vol.20, issue.10, pp.1540-1552, 2009. ,
Directional sensor placement with optimal sensing range, field of view and orientation, Mobile Networks and Applications, pp.216-225, 2010. ,
Adaptive filtering and change detection, 2000. ,
DOI : 10.1002/0470841613
Review and evaluation of commonly-implemented background subtraction algorithms, 2008 19th International Conference on Pattern Recognition, 2008. ,
DOI : 10.1109/ICPR.2008.4760998
URL : https://hal.archives-ouvertes.fr/inria-00545518
Efficient localization and tracking of multiple objects in wireless multimedia sensor networks. Ad Hoc and Wireless Sensor Networks, 2013. ,
Fundamentals of Kalman filtering: a practical approach, Aiaa, vol.208, 2005. ,
A Survey on Device-to-Device Communication in Cellular Networks, IEEE Communications Surveys & Tutorials, vol.16, issue.4, p.2014 ,
DOI : 10.1109/COMST.2014.2319555
Toward intelligent machine-to-machine communications in smart grid, IEEE Communications Magazine, vol.49, issue.4, pp.60-65, 2011. ,
Home M2M networks: Architectures, standards, and QoS improvement, IEEE Communications Magazine, vol.49, issue.4, pp.44-52, 2011. ,
DOI : 10.1109/MCOM.2011.5741145
Modeling tools to evaluate the performance of wireless multihop networksModeling and simulation of computer networks and systems: methodologies and applications, pp.978-0128008874, 2015. ,
Monitoring Mechanism for Wireless Sensor Networks, p.9781466518100 ,
DOI : 10.1201/b15425-27
URL : https://hal.archives-ouvertes.fr/hal-00620375
mHealth Contents and Services Delivery and Adaptation Challenges for Smart EnvironmentsMobile Health (mHealth): Multidisciplinary Verticals ,
Contribution à la sécurité dans les réseaux mobiles ad hoc, Mécanismes de Prévention, de Détection et de Réaction, by Presses Acamdémiques Francophones ,
To send or to defer? Improving the IEEE 802.11p/1609.4 transmission scheme, Ad hoc Networks, 2015. ,
DOI : 10.1016/j.adhoc.2016.05.008
URL : https://hal.archives-ouvertes.fr/hal-01378043
EMCOS: Energy-efficient Mechanism for Multimedia Streaming over Cognitive Radio Sensor Networks, Pervasive and Mobile Computing, pp.16-32, 2015. ,
DOI : 10.1016/j.pmcj.2015.06.015
URL : https://hal.archives-ouvertes.fr/hal-01169092
A Job Market Signaling Scheme for Incentive and Trust Management in Vehicular Ad Hoc Networks, IEEE Transactions on Vehicular Technology (TVT, pp.64-3657, 2015. ,
DOI : 10.1109/TVT.2014.2360883
URL : https://hal.archives-ouvertes.fr/hal-01378052
DTA: Deployment and Tracking Algorithm in Wireless Multimedia Sensor Networks, Ad Hoc and Sensor Wireless Networks, pp.28-29, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-00920655
Advanced quality of services with security integration in wireless sensor networks, Wireless Communications and Mobile Computing journal (WCMC), pp.1106-1116, 2015. ,
DOI : 10.1002/wcm.2562
URL : https://hal.archives-ouvertes.fr/hal-01099894
RSSI-based Localization Algorithms using Spatial Diversity in Wireless Sensor Networks Volume: 19, International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), pp.3-4157, 2015. ,
A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology, Computer Communications (ComCom) ,
DOI : 10.1016/j.comcom.2014.10.004
URL : https://hal.archives-ouvertes.fr/hal-01078082
How MIMO cross-layer design enables QoS while detecting non-cooperative nodes in wireless multi-hop networks, Journal of Network and Computer Applications (JNCA), pp.395-406, 2014. ,
DOI : 10.1016/j.jnca.2014.07.011
URL : https://hal.archives-ouvertes.fr/hal-01024263
Intelligent antenna selection decision in IEEE 802.15.4 wireless sensor networks: An experimental analysis, Computers and Electrical Engineering, pp.443-455, 2014. ,
DOI : 10.1016/j.compeleceng.2013.11.021
URL : https://hal.archives-ouvertes.fr/hal-00788125
Rate adaptation scheme for IEEE 802.11-based MANETs, Journal of Network and Computer Applications (JNCA), pp.39-126, 2014. ,
DOI : 10.1016/j.jnca.2013.05.013
URL : https://hal.archives-ouvertes.fr/hal-00828494
A secure cluster-based architecture for certificates management in vehicular networks, Security and Communication Networks (SCN), pp.665-683, 2014. ,
DOI : 10.1002/sec.772
Incentive Scheduler Algorithm for Cooperation and Coverage Extension in Wireless Networks, IEEE Transactions on Vehicular Technology (TVT), pp.797-808, 2013. ,
DOI : 10.1109/TVT.2012.2225855
URL : https://hal.archives-ouvertes.fr/hal-00740058
Wireless network simulators relevance compared to a real testbed in outdoor and indoor environments, Proceedings of the 6th International Wireless Communications and Mobile Computing Conference on ZZZ, IWCMC '10, 2012. ,
DOI : 10.1145/1815396.1815477
URL : https://hal.archives-ouvertes.fr/hal-00619777
Modeling and performance evaluation of Advanced Diffusion with Classified Data in vehicular sensor networks, Wireless Communications and Mobile Computing journal (WCMC), pp.1689-1701, 2011. ,
DOI : 10.1002/wcm.1220
URL : https://hal.archives-ouvertes.fr/hal-00680861
A Secure Mechanism Design-Based and Game Theoretical Model for MANETs, Mobile Networking and Applications journal, 2010. ,
DOI : 10.1007/s11036-009-0164-7
URL : https://hal.archives-ouvertes.fr/hal-00619750
A secure and resistant architecture against attacks for mobile ad hoc networks, Security and Communication Network journal (SCN), pp.2-3, 2010. ,
DOI : 10.1002/sec.116
URL : https://hal.archives-ouvertes.fr/hal-00746613
Impacts and solutions of control packets vulnerabilities with IEEE 802.11 MAC, Wireless Communications and Mobile Computing journal (WCMC), pp.469-488, 2009. ,
DOI : 10.1002/wcm.690
URL : https://hal.archives-ouvertes.fr/hal-00619745
Toward a Cross-layer Monitoring Process for Mobile Ad Hoc Networks, Security and Communication Network journal (SCN), pp.351-368, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00619749
Radio Resource Sharing for MTC in LTE-A: An Interference-Aware Bipartite Graph Approach, the IEEE Global Communications Conference: Wireless Networks (GC'2015), pp.6-10, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01171611
Clustering in cognitive radio for multimedia streaming over wireless Sensor networks, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), 2015. ,
DOI : 10.1109/IWCMC.2015.7289251
URL : https://hal.archives-ouvertes.fr/hal-01223810
Performance evaluation of MIMO-based MAC/PHY cross-layer design in multi-hop ad hoc networks, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2015. ,
DOI : 10.1109/WiMOB.2015.7348009
URL : https://hal.archives-ouvertes.fr/hal-01201778
A study of mobility support in wearable health monitoring systems: Design framework, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), 2015. ,
DOI : 10.1109/AICCSA.2015.7507158
URL : https://hal.archives-ouvertes.fr/hal-01260539
Jamming detection on 802.11p under multi-channel operation in vehicular networks, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2015. ,
DOI : 10.1109/WiMOB.2015.7348039
URL : https://hal.archives-ouvertes.fr/hal-01198576
Partage des ressources radio pour MTC dans LTE-A: Une approche basée sur le graphe biparti, 12ème Conférence Internationale sur les NOuvelles TEchnologies de la REpartition (NOTERE), pp.24-27 ,
Time-bounded localization algorithm based on distributed Multidimensional Scaling for Wireless Sensor Networks, 2014 IEEE International Conference on Communications (ICC), 2014. ,
DOI : 10.1109/ICC.2014.6883324
URL : https://hal.archives-ouvertes.fr/hal-00930123
P M T 2 : A Predictive Mobile Target Tracking Algorithm in Wireless Multimedia Sensor Networks, 19th IEEE Symposium on Computers and Communications (IEEE ISCC'2014), 2014. ,
A collaborative tracking algorithm for communicating target in Wireless Multimedia Sensor Networks, 2014 7th IFIP Wireless and Mobile Networking Conference (WMNC), 2014. ,
DOI : 10.1109/WMNC.2014.6878883
URL : https://hal.archives-ouvertes.fr/hal-00962257
Enhancing content dissemination for ad hoc cognitive radio, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), 2014. ,
DOI : 10.1109/IWCMC.2014.6906385
URL : https://hal.archives-ouvertes.fr/hal-01025440
L'instant propice à l'envoi d'un message sur la couche IEEE 802, 10èmes journées francophones Mobilité et Ubiquité (UbiMob2014), 1609. ,
URL : https://hal.archives-ouvertes.fr/hal-01139341
PTA: A Predictive Tracking Algorithm in Wireless Multimedia Sensor Networks, Global Information Infrastructure Symposium, GIIS 2013, 2013. ,
DOI : 10.1109/GIIS.2013.6684343
A New Model for NGN Pervasive eHealth Services, International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00836439
Adapting Job Market Signaling for Distributed Trust Management in Vehicular Ad Hoc Networks, the IEEE International Conference on Communications (ICC'2013), p.2013 ,
URL : https://hal.archives-ouvertes.fr/hal-00781590
Comparative analysis of RSSI-based indoor localization when using multiple antennas in Wireless Sensor Networks, 2013 International Conference on Selected Topics in Mobile and Wireless Networking (MoWNeT), 2013. ,
DOI : 10.1109/MoWNet.2013.6613811
URL : https://hal.archives-ouvertes.fr/hal-00831920
Security with Quality-of-Services optimization in Wireless Sensor Networks, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), 2013. ,
DOI : 10.1109/IWCMC.2013.6583747
URL : https://hal.archives-ouvertes.fr/hal-00798088
On the feasibility of making intelligent antenna selection decision in IEEE 802.15.4 wireless sensor networks, 2013 Computing, Communications and IT Applications Conference (ComComAp), 2013. ,
DOI : 10.1109/ComComAp.2013.6533606
URL : https://hal.archives-ouvertes.fr/hal-00788125
Trust and exclusion in Vehicular Ad Hoc Networks: An economic incentive model based approach, 2013 Computing, Communications and IT Applications Conference (ComComAp), 2013. ,
DOI : 10.1109/ComComAp.2013.6533601
URL : https://hal.archives-ouvertes.fr/hal-00788126
CTA: A collaborative tracking algorithm in wireless sensor networks, 2013 International Conference on Computing, Networking and Communications (ICNC), 2013. ,
DOI : 10.1109/ICCNC.2013.6504141
URL : https://hal.archives-ouvertes.fr/hal-00733536
A distributed advanced analytical trust model for VANETs, 2012 IEEE Global Communications Conference (GLOBECOM), 2012. ,
DOI : 10.1109/GLOCOM.2012.6503113
MIMODog: How to solve the problem of selfish misbehavior detection mechanism in MANETs using MIMO technology, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), 2012. ,
DOI : 10.1109/IWCMC.2012.6314226
URL : https://hal.archives-ouvertes.fr/hal-00687192
DES -Efficient Dynamic Selective Encryption Framework to Secure Multimedia Traffic in Wireless Sensor Networks, the IEEE International Conference on Communications (ICC'2012), pp.1041-1045, 2012. ,
Towards Intelligent Antenna Selection in IEEE 802.15.4 Wireless Sensor Networks, The International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc2012), pp.245-246 ,
A trust-based architecture for managing certificates in vehicular ad hoc networks, 2012 International Conference on Communications and Information Technology (ICCIT), 2012. ,
DOI : 10.1109/ICCITechnol.2012.6285787
URL : https://hal.archives-ouvertes.fr/hal-00709370
Channel bonding in cognitive radio wireless sensor networks, 2012 International Conference on Selected Topics in Mobile and Wireless Networking, 2012. ,
DOI : 10.1109/iCOST.2012.6271293
Coverage extension based on incentive scheduler for mobile relaying nodes in wireless networks, 2011 IEEE 36th Conference on Local Computer Networks, 2011. ,
DOI : 10.1109/LCN.2011.6115309
URL : https://hal.archives-ouvertes.fr/hal-00676756
Energy-aware object tracking algorithm using heterogeneous wireless sensor networks, 2011 IFIP Wireless Days (WD), pp.10-12 ,
DOI : 10.1109/WD.2011.6098160
URL : https://hal.archives-ouvertes.fr/hal-00633034
Multichannel access for bandwidth improvement in IEEE 802.15.4 Wireless Sensor Networks, 2011 IFIP Wireless Days (WD), pp.10-12 ,
DOI : 10.1109/WD.2011.6098151
URL : https://hal.archives-ouvertes.fr/hal-00680871
Wireless Sensor Network simulators relevance compared to a real IEEE 802.15.4 Testbed, 2011 7th International Wireless Communications and Mobile Computing Conference, 2011. ,
DOI : 10.1109/IWCMC.2011.5982734
URL : https://hal.archives-ouvertes.fr/hal-00620396
Advanced diffusion of Classified Data in Vehicular Sensor Networks, 2011 7th International Wireless Communications and Mobile Computing Conference, 2011. ,
DOI : 10.1109/IWCMC.2011.5982645
URL : https://hal.archives-ouvertes.fr/hal-00620395
muDog: Smart Monitoring Mechanism for Wireless Sensor Networks Based on IEEE 802.15.4 MAC, 2011 IEEE International Conference on Communications (ICC), pp.5-9, 2011. ,
DOI : 10.1109/icc.2011.5963200
URL : https://hal.archives-ouvertes.fr/hal-00620375
Wireless network simulators relevance compared to a real testbed in outdoor and indoor environments, Proceedings of the 6th International Wireless Communications and Mobile Computing Conference on ZZZ, IWCMC '10, 2010. ,
DOI : 10.1145/1815396.1815477
URL : https://hal.archives-ouvertes.fr/hal-00619777
A Cost Function for QoS-Aware Routing in Multi-tier Wireless Multimedia Sensor Networks, the 12th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Services (MMNS'2009), Lecture Notes in Computer Science 5842, pp.81-93, 2009. ,
DOI : 10.1016/j.comcom.2004.01.011
URL : https://hal.archives-ouvertes.fr/hal-00620333
Security and Pseudo-Anonymity with a Clusterbased approach for MANET, the 51th annual IEEE Global Telecommunications Conference (GLOBECOM'2008), pp.1-6, 2008. ,
URL : https://hal.archives-ouvertes.fr/hal-00680874
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp.417-422, 2008. ,
DOI : 10.1109/WiMob.2008.77
URL : https://hal.archives-ouvertes.fr/hal-00680879
Smart Attacks Based on Control Packets Vulnerabilities with IEEE 802.11 MAC, 2008 International Wireless Communications and Mobile Computing Conference, pp.588-593, 2008. ,
DOI : 10.1109/IWCMC.2008.102
URL : https://hal.archives-ouvertes.fr/hal-00680881
Relative Fairness and Optimized throughput for Mobile Ad Hoc Networks, 2008 IEEE International Conference on Communications, pp.2233-2237, 2008. ,
DOI : 10.1109/ICC.2008.426
URL : https://hal.archives-ouvertes.fr/hal-00680884
Cross-Layer approach to improve the monitoring process for Mobile Ad Hoc Networks based on IEEE 802, the 50th annual IEEE Global Telecommunications Conference (GLOBECOM'2007), pp.1086-1091, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00680886
A Confident Community to Secure Mobile Ad Hoc Networks, 2007 IEEE International Conference on Communications, pp.1254-1259, 2007. ,
DOI : 10.1109/ICC.2007.212
URL : https://hal.archives-ouvertes.fr/hal-00680887
A Secure Architecture for Mobile Ad Hoc Networks, the 2nd International Conference on Mobile Ad-Hoc and Sensor Networks (MSN2006), pp.424-435, 2006. ,
DOI : 10.1007/11943952_36
URL : https://hal.archives-ouvertes.fr/hal-00680891
Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks, 2006 International Conference on Systems and Networks Communications (ICSNC'06), pp.72-78, 2006. ,
DOI : 10.1109/ICSNC.2006.74
URL : https://hal.archives-ouvertes.fr/hal-00680894
Surveillance dans les rseaux de capteurs et les rseaux mobiles ad hoc, 2009. ,
Gestion de confiance et résistance aux attaques dans les réseaux Ad hoc mobiles, 8ème Colloque Francophone de Gestion de Réseaux et de Services ,
Architecture Hiérarchique Distribuée pour sécuriser les réseaux Ad hoc Mobiles, 8ème Journées Doctorales en Informatique et Réseaux JDIR, 2007. ,
Contribution à la sécurité du PDA : IDS Embarqué EIDS, SAR'04 (rencontre francophone sur Sécurité et Architecture Réseaux), 3ème Conférence sur la Sécurité et Architectures Réseaux, 2004. ,