Browsing by Author "Khemissa, Hamza"
Now showing 1 - 4 of 4
Results Per Page
Sort Options
- ItemAn Authentication Scheme for heterogeneous Wireless Sensor Networks in the context of Internet of Things(CERIST, 2016-02-21) Khemissa, Hamza; Tandjaoui, DjamelThe evolution of Internet of Things (IoT) is changing traditional perceptions of the current Internet towards a vision of smart objects interacting with each other. Wireless Sensor Networks play an important role and support different applications domains in the IoT environment. However, security issues are the major obstacle for their deployment. Among these issues, authentication of the different interconnected entities. In this paper, we are interested to the case of the interconnection of a sensor node with a remote user. We propose a new lightweight authentication scheme adapted to the resource constrained environment. This scheme allows both of the sensor and the remote user to authenticate each other in order to secure the communication. Our scheme uses nonces, exclusiveor operations, and Keyed-Hash message authentication to check the integrity of the different exchanges. Moreover, it provides authentication with less energy consumption, and it terminates with a session key agreement between the sensor node and the remote user. To assess our scheme, we carry out a performance and security analysis. The obtained results show that our scheme saves energy, and provides a resistance against different types of attacks.
- ItemAn Authentication Scheme for Internet of Things(CERIST, 2015-07-10) Khemissa, Hamza; Tandjaoui, DjamelInternet of Things (IoT) is changing traditional perceptions of the current Internet towards a vision of smart objects interacting with each other. However, security issues are the major obstacle for their deployment. Among these issues, authentication of the different interconnected entities and exchanged data confidentiality constitutes the main concerns for users. In this paper, we propose a new lightweight authentication scheme for an e-health application in Internet of Things. This scheme allows both of sensors and the Base Station (BS) to authenticate each other in order to secure the collection of health-related data. Our scheme uses nonces and Keyed-Hash message authentication (HMAC). In addition, it provides authentication, and it terminates with a session key agreement between each sensor and the Base Station. To assess our scheme, we carry out a security analysis. The obtained results show that our scheme is resistant against different types of attacks.
- ItemDeep learning in pervasive health monitoring, design goals, applications, and architectures: An overview and a brief synthesis(Elsevier, 2021-11) Boulemtafes, Amine; Khemissa, Hamza; Derki, Mohamed Saddek; Amira, Abdelouahab; Djedjig, NabilThe continuous growth of an aging population in some countries, and patients with chronic conditions needs the development of efficient solutions for healthcare. Pervasive Health Monitoring (PHM) is an important pervasive computing application that has the potential to provide patients with a high-quality medical service and enable quick-response alerting of critical conditions. To that end, PHM enables continuous and ubiquitous monitoring of patients' health and wellbeing using Internet of Things (IoT) technologies, such as wearables and ambient sensors. In recent years, deep learning (DL) has attracted a growing interest from the research community to improve PHM applications. In this paper, we discuss the state-of-the-art of DL-based PHM, through identifying, (1) the main PHM applications where DL is successful, (2) design goals and objectives of using DL in PHM, and (3) design notes including DL architectures and data preprocessing. Finally, main advantages, limitations and challenges of the adoption of DL in PHM are discussed.
- ItemEtude et classification des valnerabillites de windows 2000 et linux(Centre de Recherche sur l'Information Scientifique et Technique, 2003) Bendrissou, Mohamed; Benartaoui, , Abdelhamid; Khemissa, HamzaChaque jour, les laboratoires de recherche de vulnérabilités publient des nouvelles failles sur les systèmes d’exploitation. Ces failles peuvent être exploitées, pour un premier temps, par les ’’Hackers’’ connaisseurs pour réaliser des accès non autorisés ou des dénis de services sur ces systèmes. Aussitôt qu’elles soient connues par les Hackers des outils d’attaque les exploitant sont développés. Ce qui augmente le nombre d’attaques en exponentiel.Pour régler ces problèmes de sécurité des correctifs sont développés. Ainsi avoir un système mis à jour par ces correctifs est une exigence primordiale pour se prémunir des différents risques. Le suivi des alertes et des correctifs est la tâche demandée aux administrateurs, afin d’assurer la sécurité de leurs systèmes. Des organismes et des sites Internet spécialisés exposent la liste des nouvelles vulnérabilités détectées et leurs correctifs correspondants. Ou encore plus, ils se spécialisent dans l’étude technique des failles systèmes. Ils Proposent des outils logiciels qui permettent de diagnostiquer l’état des serveurs en simulant les différents scénarios d’attaques répertoriés dans une base de données mise à jour. Notre étude consiste à étudier les vulnérabilités des systèmes Windows 2000 et Linux et les classer par degré de nuisance. Cette étude servira de base pour le diagnostic, le suivi et l’administration des systèmes.