Work place: Telecom Sud Paris, France
E-mail: benamarkadri@yahoo.fr
Website:
Research Interests: Application Security, Hardware Security, Information Security, Network Security, Information-Theoretic Security
Biography
Abdallah M’hamed is professor in Network security and dependability. He received his Doctor degree in dependability studies from the Technological University of Compiegne, France. In 1990 he joined the National Institute of Telecommunications, in Evry France. Member of the Handicom laboratory, his recent research activities are focused on authentication protocols and architectures, security and privacy in smart environments.
By Benamar KADRI Mohammed FEHAM Abdellah MHAMMED
DOI: https://doi.org/10.5815/ijitcs.2013.06.04, Pub. Date: 8 May 2013
Similar to conventional wireless networks, WSNs are based on multi hop routing to ensure connectivity and data forwarding which makes the routing service a challenging task due to the nature of sensors usually limited in memory, battery and computing capacities as well as the nature of the environment which is hostile and unpredictable making the routing protocols developed for conventional wireless network useless for WSNs without modifications and adaptations for the new context of WSNs. Thus in this paper we present an optimized version of AODV protocol for WSNs which takes into consideration the traffic pattern of WSNs and sensors’ constraints. In the proposed protocol we affect the task of route discovery to the base station which periodically informs sensors about its location instead of letting this task to sensors which consumes the network resources due to the broadcasting nature of the route discovery. We have also proposed a key distribution scheme destined to establish a symmetric encrypting key between each sensor and the base station, the proposed key management scheme uses the underlying routing requests to execute handshakes and key update which have greatly saved the network resources and ensured a good threshold of security.
[...] Read more.By Benamar KADRI Mohammed FEHAM Abdellah MHAMMED
DOI: https://doi.org/10.5815/ijitcs.2012.12.05, Pub. Date: 8 Nov. 2012
The emergence of wireless networking as well as the development in embedded systems and technologies have given birth to application specific networks called wireless sensor networks WSNs, their flexibility, facility of use and deployment as well as their low cost give them an increasing field of applications. Usually sensors are limited in capacities deployed in a hostile and unpredictable environment, making the security of these networks a challenging task. In this paper we are going to present a key management scheme in which the base station play the role of the secure third party responsible of distributing key and managing security in the network, two versions of this scheme are presented the first one for flat networks and the second one for hierarchical networks in which the cluster head play the key role in all key agreement with the base station.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals