Batna, Algeria
Batna, Algeria

Time filter

Source Type

Hafi H.,University of Ouargla | Bilami A.,LaSTIC Laboratory
Studies in Computational Intelligence | Year: 2013

Mobile peer-to-peer networking (MP2P) is a relatively new paradigm compared to other wireless networks. In the last years, it has gained popularity because of its practice in applications such as file sharing over Internet in a decentralized manner. Security of mobile P2P networks represents an open research topic and a main challenge regarding to their vulnerability and convenience to different security attacks, such as black hole, Sybil...etc. In this paper, we analyze the black hole attack in mobile wireless P2P networks using AODV as routing protocol. In a black hole attack, a malicious node assumes the identity of a legitimate node, by creating forged answers with a higher sequence number, and thus forces the victim node to choose it as relay. We propose a solution based on a modification of the well-known AODV routing protocol and taking into account the behavior of each node participating in the network. Performances of our proposal are evaluated by simulation. © Springer International Publishing Switzerland 2013.


Athmani S.,University of Batna | Boubiche D.E.,LaSTIC Laboratory | Bilami A.,LaSTIC Laboratory
2013 World Congress on Computer and Information Technology, WCCIT 2013 | Year: 2013

Due to their particular characteristics, wireless sensor networks (WSN) are severely vulnerable to malicious attacks. Black hole is one of the most malicious attacks that target sensors routing protocols. This kind of attacks can have devastating impact on hierarchical routing protocols. Several security solutions have been proposed to secure WSNs from black hole attacks. However, most of these solutions are complex and energy inefficient. In this paper we propose a hierarchical energy efficient intrusion detection system, to protect sensor network from black hole attacks. Our approach is simple and based on control packets exchange between sensor node and base station. We have experimentally evaluated our system using the NS simulator to demonstrate its effectiveness in detecting and preventing efficiently the black hole attacks. © 2013 IEEE.


Beghriche A.,LaSTIC Laboratory | Bilami A.,LaSTIC Laboratory
Communications in Computer and Information Science | Year: 2012

Ad hoc networks are vulnerable to many types of attacks. Their success will undoubtedly depend on the trust they bring to their users. To enhance the security of MANETs, it is important to rate the trustworthiness of other nodes without central authorities to build up a trust environment. This paper expands on relevant fuzzy logic concepts to propose an approach to establish quantifiable trust levels between the nodes of Ad hoc networks. The proposed solution defines additional operators to fuzzy logic in order to find an end to end route which is free of malicious nodes with collaborative effort from the neighbors. In our scheme (RTIC) the path with more trusted decision value is selected as a secure route from source to destination. In order to prove the applicability of the proposed solution, we demonstrate the performance of our model through NS-2 simulations. © Springer-Verlag Berlin Heidelberg 2012.


Boubiche D.E.,LaSTIC laboratory | Bilami A.,LaSTIC laboratory | Athmani S.,LaSTIC laboratory
Communications in Computer and Information Science | Year: 2012

Wireless sensor networks are particularly exposed to several kinds of attacks. Due to resources constrained property in WSN, Denial of sleep attacks is recognized as one of the most serious threats. Attacks of this type exhaust power supply of sensor nodes and reduce the sensor lifetime. Most of existing researches propose authentication and encryption solutions to protect the network from denial of sleep attacks. However, it is more efficient to use simpler solutions to the same security challenges due to limited processing capability, memory storage, and energy capacity. In this paper we propose a cross layer energy-efficient security mechanism to protect the network from these attacks. Simulation reveals that our proposal is energy efficient and able to achieve significant performance in term of preventing network nodes from different denial of sleep attacks. © Springer-Verlag Berlin Heidelberg 2012.


Boubiche D.E.,LaSTIC Laboratory | Bilami A.,LaSTIC Laboratory
Journal of Emerging Technologies in Web Intelligence | Year: 2013

One of the most challenging issues in wireless sensor networks is resilience against malicious attacks. Since energy is the most precious resource for these networks, Denial of sleep attacks is recognized as one of the most serious threats. Such attacks exhaust power supply of sensor nodes and can reduce the sensor lifetime from years to days. Authentication and encryption solutions have been proposed to protect the network from denial of sleep attacks. Though, the resources constraint motivates the use of simpler solutions to the same security challenges. In this paper, we survey different types of denial of sleep attacks and we propose a cross layer energy efficient security mechanism to protect the network from these attacks. The cross layer interaction between network Mac and physical layers is mainly exploited to identify the intruders' nodes and prevent sensor nodes from energy exhaust attacks. Simulation results indicate that our proposal is energy efficient and can significantly reduce the effect of denial of sleep attacks. © 2013 ACADEMY PUBLISHER.


Boubiche D.E.,LaSTIC Laboratory | Boubiche S.,LaSTIC Laboratory | Bilami A.,LaSTIC Laboratory
IEEE Communications Letters | Year: 2015

Ensuring data aggregation integrity introduces new challenges for data aggregation security protocols in heterogeneous wireless sensor networks. In this paper, we propose an efficient watermarking based security strategy to ensure data aggregation integrity in heterogeneous WSNs. The proposed security scheme suggests a new fragile watermarking technique based on a dynamic embedding mechanism and a cross-layer approach. Compared to the existing heterogeneous security solutions, our system respects the resources limitations of the homogenous sensor nodes and optimizes the data aggregation process on the heterogeneous aggregation nodes. The proposal is evaluated using simulation. © 2015 IEEE.


Bensari M.,LaSTIC Laboratory | Bilami A.,LaSTIC Laboratory
Studies in Computational Intelligence | Year: 2013

The growing area of lightweight devices, such as mobile cell phones, PDA conduct to the rapid growth of mobile networks, they are playing important role in everyone's day. Mobile Networks offer unrestricted mobility and tender important services like M-business, M-Learning, where, such services need to keep security of data as a top concern. The root cause behind the eavesdroppers in these networks is the un-authentication. Designing authentication protocol for mobile networks is a challenging task, because, mobile device's memory, processing power, bandwidths are limited and constrained. Cryptography is the important technique to identify the authenticity in mobile networks. The authentication schemes for this networks use symmetric or asymmetric mechanisms. In this paper, we propose a hybrid authentication protocol that is based on Elliptic Curve Cryptography which is, actually, the suitable technique for mobile devices because of its small key size and high security. © Springer International Publishing Switzerland 2013.


Fouzi L.,LaSTIC Laboratory | Zidani A.,LaSTIC Laboratory | Chorfi A.,LaSTIC Laboratory
2012 International Conference on Information Technology and e-Services, ICITeS 2012 | Year: 2012

Hospital emergency wards such as Gynaecology and obstetrics maternities are extremely complex to manage and pose serious health risks to patients. Related tasks which are mainly focused around patient management are basically achieved through a cooperative way that involves several health care professionals. Such team members with separate skills and roles should work together during patients' management. In this paper, we firstly discuss our study of work in-situ within an Algerian maternity ward to better understand the usual way under which tasks are effectively achieved and identify the artefacts used. Such observation allowed us to highlight vital collaborative medical tasks that need to be designed. The following sections outline basic design concepts of our collaborative planning system, which is designed to provide a flexible group interaction support for care coordination and continuity. © 2012 IEEE.

Loading LaSTIC Laboratory collaborators
Loading LaSTIC Laboratory collaborators