Research Reports
Permanent URI for this collectionhttp://dl.cerist.dz/handle/CERIST/34
Browse
6 results
Search Results
Item An Authentication Scheme for heterogeneous Wireless Sensor Networks in the context of Internet of Things(CERIST, 2016-02-21) Khemissa, Hamza; Tandjaoui, DjamelThe evolution of Internet of Things (IoT) is changing traditional perceptions of the current Internet towards a vision of smart objects interacting with each other. Wireless Sensor Networks play an important role and support different applications domains in the IoT environment. However, security issues are the major obstacle for their deployment. Among these issues, authentication of the different interconnected entities. In this paper, we are interested to the case of the interconnection of a sensor node with a remote user. We propose a new lightweight authentication scheme adapted to the resource constrained environment. This scheme allows both of the sensor and the remote user to authenticate each other in order to secure the communication. Our scheme uses nonces, exclusiveor operations, and Keyed-Hash message authentication to check the integrity of the different exchanges. Moreover, it provides authentication with less energy consumption, and it terminates with a session key agreement between the sensor node and the remote user. To assess our scheme, we carry out a performance and security analysis. The obtained results show that our scheme saves energy, and provides a resistance against different types of attacks.Item An Authentication Scheme for Internet of Things(CERIST, 2015-07-10) Khemissa, Hamza; Tandjaoui, DjamelInternet of Things (IoT) is changing traditional perceptions of the current Internet towards a vision of smart objects interacting with each other. However, security issues are the major obstacle for their deployment. Among these issues, authentication of the different interconnected entities and exchanged data confidentiality constitutes the main concerns for users. In this paper, we propose a new lightweight authentication scheme for an e-health application in Internet of Things. This scheme allows both of sensors and the Base Station (BS) to authenticate each other in order to secure the collection of health-related data. Our scheme uses nonces and Keyed-Hash message authentication (HMAC). In addition, it provides authentication, and it terminates with a session key agreement between each sensor and the Base Station. To assess our scheme, we carry out a security analysis. The obtained results show that our scheme is resistant against different types of attacks.Item Trust management in IoT routing protocol(CERIST, 2015-04-19) Djedjig, Nabil; Tandjaoui, Djamel; Medjek, FaizaThe Routing Protocol for Low-Power and Lossy Networks (RPL) is the routing protocol standardized for constrained environments such as 6LoWPAN networks, and is considered as the routing protocol of the Internet of Things (IoT). However, this protocol is subject to several internal and external attacks. In this paper, we investigate a trust management protocol in RPL. Our idea of trust management in RPL is to establish a dynamic trust relationship between the different nodes involved in routing. In fact, RPL organizes a logical representation of the network topology using control messages. In our proposed protocol, we strengthen RPL by adding a new trustworthiness metric during RPL construction and maintenance. This metric allows a node to decide whether or not to trust the other nodes during the construction of the topology.Item Evaluation of the impacts of Sybil attacks against RPL under mobility(CERIST, 2014-06) Medjek, Faiza; Tandjaoui, Djamel; Djedjig, NabilThe Routing Protocol for Low-Power and Lossy Networks (RPL) is the routing protocol standardized for constrained environments such as 6LoWPAN networks, and is considered as the routing protocol of the Internet of Things (IoT). However, this protocol is subject to several attacks that have been analyzed on static case. Nevertheless, IoT will likely present dynamic and mobile applications. In this paper, we introduce potential security threats on RPL, in particular Sybil attacks when the Sybil nodes are mobile. In addition, we present an analysis and a discussion on how network performances can be affected. Our analysis shows, under Sybil attacks while nodes are mobile, that the performances of RPL are highly affected compared to the static case. In fact, we notice a decrease in the rate of packet delivery, and an increase in control messages overhead. As a result, energy consumption at constrained nodes increases. Our proposed attacks demonstrate that Sybil mobile nodes can easily disrupt RPL and overload the network with fake messages making it unavailable. Based on the obtained results we provide some recommendations to tackle this issue.Item A Lightweight Key Management Scheme for E-health applications in the context of Internet of Things(CERIST, 2014-03-15) Abdmeziem, Riad; Tandjaoui, DjamelIn the context of Internet of Things where real world objects will automatically be part of the Internet, ehealth applications have emerged as a promising approach to provide unobtrusive support for elderly and frail people based on their situation and circumstances. However, due to the limited resource available in such systems and privacy concerns that might rise from the capture of personal data, security issues constitute a major obstacle to their deployment. Authentication of the different entities involved and data confidentiality constitute the main concerns for users that need to be addressed. In this paper, we propose a new key management scheme for an ehealth application to allow sensors and the Base Station (BS) to negotiate certain security credentials that will be used to protect the information flow. Our prtocol provides a strong level of security guaranteeing authentication and data confidentiality while the scarcity of resources is taken into consideration. The scheme is based on a lightweight Public Key Infrastructure (PKI) where the sensors have to perform only one Elliptic Curve Cryptography (ECC) decryption in the key establishment process. Data exchanges are then secured by the use of symmetric encryption. In addition, Time Stamps are used to prevent replay attacks along with Message Code Authentication (MAC) to ensure integrity.Item QoS aware Multiple Spanning Tree Mechanism in Multi-Radio multi-channel WMN(CERIST, 2009) Aoufi, souhila; Tandjaoui, DjamelA single-channel wireless mesh backbone may suffer from capacity limitations since all the wireless routers share the same channel. A multi-channel broadband wireless mesh backbone may have different capacity. This paper addresses the problem of channel assignment (CA) with differentiated services (DiffServ) to support the quality-of-service (QoS) in the wireless mesh backbone. We propose a novel, simple and yet highly effective enhancement to the Spanning Tree protocol of ‘hyacinth’ to achieve high degree of QoS by keeping in perspective the different characteristics of the various traffic types in the Diffserv framework. We discuss the problems of CA and present in detail our proposed extension to overcome them