Espace membre

Cet espace est dédié aux étudiants, aux enseignants et au personnel administratif de l'école


Mot de passe oublié?

Actualités de l'école


Doctorate Thesis Defense

Doctorate Thesis defense on March 13th 2014 at 8:00 AM, Sup'Com.

Entitled : Security, Deployment and scheduling in WSN-based Applications: Models and Applications

Presented by : Ramzi BELLAZREG 


President :

Dr. Nabil Tabbane

SUP'COM, Tunisia.




Examiners :

Pr.Yahiya Slimani

Higher school of multimedia arts, Tunisia.


Pr. Ahmed Mehaoua

Paris Descartes University, France.


Members :

Pr. Noureddine Boudriga

SUP'COM, Tunisia.


Dr. Slim Rekhis

SUP'COM, Tunisia


The WSNs are used in many fields to build surveillance systems to detect and report intrusion related events. In this thesis, we will address research issues related to the wireless sensor networks to provide solutions adapted to different applications and implementation contexts.

In the first issue, we took interest to provide new deployment strategies for WSNs. We developed several deployment techniques adapted to many contexts while resolving a set of constraints. We first developed a deployment technique that takes into account the radio irregularities. We also provided a deployment technique taking into account the variation of the sensing range coping with the energy consumed by the sensors. Another deployment technique based on the geographical nature of the monitored area was developed. As a fourth deployment technique, a heterogeneous network suitable for Border Surveillance applications and a deployment and routing techniques to ensure both coverage and connectivity is presented. In particular, framework for Border Surveillance is provided and a new deployment technique based on paving the monitored area with paving patterns is introduced.

In the second issue, we focused on the scheduling schemes to extend the lifetime of WSN networks. We propose two scheduling schemes based on different decision factors. The first scheduling scheme allows the sensors to alternate between active and sleep statuses is depending on their energy. The second scheduling scheme is based on the analysis of targets’ mobility. A prediction of the next positions of the targets will give decisions on the sensors that will be activated.

In the third issue, we proposed a dynamic tunneling protocol named DynTunKey. This security protocol ensures the authentication of sensor nodes, along with the integrity and the confidentiality of the exchanged data. DynTunKey constructs many-to-many tunnels and establishes group keys. All the trusted nodes contribute in the establishment of the secured tunnels. We introduced in DynTunKey the concept of the CSA (Cluster Security Association) to represent the many-to-many tunnel based on the group key established.