Publications by Author: Somia Sahraoui

2021
Sahraoui S, Bilami A. Securing human‐to‐thing interactions in the Internet of Things with asymmetric and selective mechanism. Security and PrivacySecurity and Privacy. 2021;4 :e38.
2020
Bilami A, Sahraoui S. Mechanisms to secure communications in the IoT. In: Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications. IGI Global ; 2020. pp. 498-521.
2018
Sahraoui S, Sahraoui S, Benbousa O, Berkani A-S, Bilami A. Sensor-based wearable system for the detection and automatic treatment of nocturnal hypoglycaemia. Healthcare Technology LettersHealthcare Technology Letters. 2018;5 :239 - 241.Abstract
Diabetic patients are prone to daily and severe health-related risks, namely hyper and hypoglycaemia. Hypoglycaemia phenomenon happens when the glucose level in patient’s blood is lower than a well-determined sill. It may induce serious impacts, such as functional brain failure or even the death. Hypoglycaemia is especially dangerous when it occurs during the night while the patient is asleep because it becomes difficult to be detected by the patient itself or other persons around him. While all existing sensor-based solutions are detection-only driven, the proposed solution goes beyond and attempts to treat autonomously, and at low cost, the nocturnal hypoglycaemia. The presented system detects the nocturnal hypoglycaemia phenomenon based on accelerated heart-rate symptom and a progressive detection algorithm. The system treats then the detected nocturnal hypoglycaemia throughout safe and automatic injection of glucagon.
2016
Sahraoui S, Bilami A. Asymmetric end-to-end security for human-to-thing communications in the internet of things. In: Modelling and Implementation of Complex Systems. Springer ; 2016. pp. 249-260.
2015
Sahraoui S, Bilami A. Efficient HIP-based approach to ensure lightweight end-to-end security in the internet of things. Computer NetworksComputer Networks. 2015;91 :26-45.
2014
Sahraoui S, Bilami A. Compressed and distributed host identity protocol for end-to-end security in the IoT. 2014 International Conference on Next Generation Networks and Services (NGNS). 2014 :295-301.