Browsing by Author "Amira, Abdelouahab"
Now showing 1 - 5 of 5
Results Per Page
Sort Options
- ItemAuthentification dans les réseaux sans-fils(Centre de Recherce sur l'Information Scientifique et Technique, 2009) Amira, Abdelouahab; Hadj arab, Samir; Nouali-Taboudjemat, NadiaL'authenti cation est l'un des premier rempart de la s ecurit e informatique, son but est de v eri er l'identit e dont une entit e (personne ou machine) se r eclame. Les r eseaux sans fils sont de par leur nature moins sur que les r éseaux cabl es : comme l'information est transmise dans l'air sous forme d'ondes radios elle est susceptible d'etre captur ée, alt er ée, etc. Pour les r éseaux WiFi sur lesquels nous avons travaillé , plusieurs solutions ont ét é propos ées pour les s écuriser. Parmi elles, on trouve les protocoles WEP, WPA, WPA2 et 802.1X. N éanmoins, certaines de ces solutions se sont r év él ées inaptes à assurer un niveau de s ecurit e satisfaisant. Dans ce m émoire nous avons r éalis é une synthèse sur l'authentifi cation dans les r éseaux sans fils, puis quelques tests avant de proposer une architecture sans fil s écuris ée assurant l'authentifi cation en se basant sur un serveur d’authentification RADIUS.
- ItemDeep learning in pervasive health monitoring, design goals, applications, and architectures: An overview and a brief synthesis(Elsevier, 2021-11) Boulemtafes, Amine; Khemissa, Hamza; Derki, Mohamed Saddek; Amira, Abdelouahab; Djedjig, NabilThe continuous growth of an aging population in some countries, and patients with chronic conditions needs the development of efficient solutions for healthcare. Pervasive Health Monitoring (PHM) is an important pervasive computing application that has the potential to provide patients with a high-quality medical service and enable quick-response alerting of critical conditions. To that end, PHM enables continuous and ubiquitous monitoring of patients' health and wellbeing using Internet of Things (IoT) technologies, such as wearables and ambient sensors. In recent years, deep learning (DL) has attracted a growing interest from the research community to improve PHM applications. In this paper, we discuss the state-of-the-art of DL-based PHM, through identifying, (1) the main PHM applications where DL is successful, (2) design goals and objectives of using DL in PHM, and (3) design notes including DL architectures and data preprocessing. Finally, main advantages, limitations and challenges of the adoption of DL in PHM are discussed.
- ItemInvestigating Security and Privacy Concerns in Deep-Learning-based Pervasive Health Monitoring Architectures(IEEE, 2023-11) Boulemtafes, Amine; Amira, Abdelouahab; Derki, Mohamed Saddek; Hadjar, SamirPervasive Health Monitoring (PHM) uses sensors and wearable devices and data analytics for real-time health monitoring. It enables early detection and personalized care interventions. This technology has the potential to revolutionize healthcare by improving proactive and preventive care.Besides, Deep learning (DL) based PHM is even more promising as it improves the discovery of complex patterns and correlations. This leads to precise health monitoring and personalized care, enhances diagnostics, and ultimately improves patient outcomes in the field of healthcare.However, privacy and security considerations must be addressed for successful implementation. This paper investigates the security and privacy concerns in Pervasive Health Monitoring architectures. It discusses through an illustrative DL-based PHM architecture the potential threats and attacks during the inference and training phases, and identifies key security and privacy issues. It also gives insights on countermeasures and technological solutions that can address security and privacy concerns in PHM architectures.
- ItemSHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing(Springer, 2022) Saidi, Ahmed; Nouali, Omar; Amira, AbdelouahabAttribute-based encryption (ABE) is an access control mechanism that ensures efficient data sharing among dynamic groups of users by setting up access structures indicating who can access what. However, ABE suffers from expensive computation and privacy issues in resource-constrained environments such as IoT devices. In this paper, we present SHARE-ABE, a novel collaborative approach for preserving privacy that is built on top of Ciphertext-Policy Attribute-Based Encryption (CP-ABE). Our approach uses Fog computing to outsource the most laborious decryption operations to Fog nodes. The latter collaborate to partially decrypt the data using an original and efficient chained architecture. Additionally, our approach preserves the privacy of the access policy by introducing false attributes. Furthermore, we introduce a new construction of a collaboration attribute that allows users within the same group to combine their attributes while satisfying the access policy. Experiments and analyses of the security properties demonstrate that the proposed scheme is secure and efficient especially for resource-constrained IoT devices.
- ItemTriDroid: a triage and classification framework for fast detection of mobile threats in android markets(Springer-Verlag, 2021) Amira, Abdelouahab; Derhab, Abdelouahid; Karbab, ElMouatez Billah; Nouali, Omar; Aslam Khan , FarrukhThe Android platform is highly targeted by malware developers, which aim to infect the maximum number of mobile devices by uploading their malicious applications to different app markets. In order to keep a healthy Android ecosystem, app-markets check the maliciousness of newly submitted apps. These markets need to (a) correctly detect malicious app, and (b) speed up the detection process of the most likely dangerous applications among an overwhelming flow of submitted apps, to quickly mitigate their potential damages. To address these challenges, we propose TriDroid, a market-scale triage and classification system for Android apps. TriDroid prioritizes apps analysis according to their risk likelihood. To this end, we categorize the submitted apps as: botnet, general malware, and benign. TriDroid starts by performing a (1) Triage process, which applies a fast coarse-grained and less-accurate analysis on a continuous stream of the submitted apps to identify their corresponding queue in a three-class priority queuing system. Then, (2) the Classification process extracts fine-grained static features from the apps in the priority queue, and applies three-class machine learning classifiers to confirm with high accuracy the classification decisions of the triage process. In addition to the priority queuing model, we also propose a multi-server queuing model where the classification of each app category is run on a different server. Experiments on a dataset with more than 24K malicious and 3K benign applications show that the priority model offers a trade-off between waiting time and processing overhead, as it requires only one server compared to the multi-server model. Also it successfully prioritizes malicious apps analysis, which allows a short waiting time for dangerous applications compared to the FIFO policy.