scispace - formally typeset
Search or ask a question
Author

Mohammed Riyadh Abdmeziem

Bio: Mohammed Riyadh Abdmeziem is an academic researcher from University of the Sciences. The author has contributed to research in topics: Key management & The Internet. The author has an hindex of 6, co-authored 9 publications receiving 224 citations. Previous affiliations of Mohammed Riyadh Abdmeziem include University of Lorraine & University of Science and Technology Houari Boumediene.

Papers
More filters
Book ChapterDOI
01 Jan 2016
TL;DR: This chapter reviews the main proposed architectures for the Internet of Things, highlighting their adequacy with respect to IoT requirements, and introduces the high level architecture of IoT before diving into the details of each proposed architecture.
Abstract: Internet of things (IoT) constitutes one of the most important technological development in the last decade. It has the potential to deeply affect our life style. However, its success relies greatly on a well-defined architecture that will provide scalable, dynamic, and secure basement to its deployment. In fact, several challenges stand between the conceptual idea of IoT, and the full deployment of its applications into our daily life. IoT deployment is closely related to the establishment of a standard architecture. This architecture should support future extensions, and covers IoT characteristics such as distributivity, interoperability, and scalability. A well defined, scalable, backward compatible, and secure architecture is required to bring the IoT concept closer to reality. In the literature, several architectures have been proposed. Nevertheless, each architecture brings a share of drawbacks, and fails covering all IoT characteristics. In this chapter, we review the main proposed architectures for the Internet of Things, highlighting their adequacy with respect to IoT requirements. Firstly, we present IoT building blocks. Then, we introduce the high level architecture of IoT before diving into the details of each proposed architecture. In addition, we introduce a classification of the reviewed architectures based on their technical aspects, and their ability to match IoT characteristics. Finally, based on the main shortcomings of the proposed architectures, we conclude with some design ideas for shaping the future IoT.

121 citations

Journal ArticleDOI
TL;DR: A new lightweight key management protocol based on collaboration to establish a secure end-to-end communication channel between a highly resource constrained node and a remote entity and shows that its security properties are ensured.

81 citations

Proceedings ArticleDOI
28 Dec 2015
TL;DR: This work introduces a novel decentralized and batch-based group key management protocol to secure multicast communications that reduces the rekeying overhead triggered by membership changes in dynamic and mobile groups and guarantees both backward and forward secrecy.
Abstract: It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and mission-critical sensing tasks, securing multicast applications is therefore highly desirable. To secure group communications, several group key management protocols have been introduced. However, the majority of the proposed solutions are not adapted to the IoT and its strong processing, storage, and energy constraints. In this context, we introduce a novel decentralized and batch-based group key management protocol to secure multicast communications. Our protocol is simple and it reduces the rekeying overhead triggered by membership changes in dynamic and mobile groups and guarantees both backward and forward secrecy. To assess our protocol, we conduct a detailed analysis with respect to its communication and storage costs. This analysis is validated through simulation to highlight energy gains. The obtained results show that our protocol outperforms its peers with respect to the rekeying overhead and the mobility of members.

26 citations

Proceedings ArticleDOI
28 Apr 2015
TL;DR: In this paper, the authors introduce potential security threats on RPL, in particular Sybil attack when the Sybil nodes are mobile, and present an analytical analysis and a discussion on how network performances can be affected.
Abstract: The Routing Protocol for Low-Power and Lossy Networks (RPL) is the standardized routing protocol for constrained environments such as 6LoWPAN networks, and is considered as the routing protocol of the Internet of Things (IoT), However, this protocol is subject to several attacks that have been analyzed on static case. Nevertheless, IoT will likely present dynamic and mobile applications. In this paper, we introduce potential security threats on RPL, in particular Sybil attack when the Sybil nodes are mobile. In addition, we present an analytical analysis and a discussion on how network performances can be affected. Our analysis shows, under Sybil attack while nodes are mobile, that the performances of RPL are highly affected compared to the static case. In fact, we notice a decrease in the rate of packet delivery, and an increase in control messages overhead. As a result, energy consumption at constrained nodes increases. Our proposed attack demonstrate that a Sybil mobile node can easily disrupt RPL and overload the network with fake messages making it unavailable.

20 citations

Book ChapterDOI
22 Jun 2014
TL;DR: A new key management scheme is introduced that aims to establish session keys for highly resource-constrained nodes ensuring security protection through strong encryption and authentication means and demonstrates that the protocol provides strong security features while the scarcity of resources is taken into consideration.
Abstract: In the context of Internet of Things where real world objects will automatically be part of the Internet, e-health applications have emerged as a promising approach to provide unobtrusive support for elderly and frail people. However, due to the limited resources available and privacy concerns, security issues constitute a major obstacle to their deployment. Among these issues, key distribution for heterogeneous nodes is problematic due to the inconsistencies in their cryptographic primitives. This paper introduces a new key management scheme that aims to establish session keys for highly resource-constrained nodes ensuring security protection through strong encryption and authentication means. Our protocol is based on collaboration by offloading heavy asymmetric cryptographic operations to a set of third parties. The generated shared secret is then used to derive further credentials. Security analysis demonstrates that our protocol provides strong security features while the scarcity of resources is taken into consideration.

18 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This study aims to serve as a useful manual of existing security threats and vulnerabilities of the IoT heterogeneous environment and proposes possible solutions for improving the IoT security architecture.

889 citations

Journal ArticleDOI
TL;DR: A comprehensive survey of ML methods and recent advances in DL methods that can be used to develop enhanced security methods for IoT systems and presents the opportunities, advantages and shortcomings of each method.
Abstract: The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an estimated 50 billion devices by the end of 2020. However, the crosscutting nature of IoT systems and the multidisciplinary components involved in the deployment of such systems have introduced new security challenges. Implementing security measures, such as encryption, authentication, access control, network and application security for IoT devices and their inherent vulnerabilities is ineffective. Therefore, existing security methods should be enhanced to effectively secure the IoT ecosystem. Machine learning and deep learning (ML/DL) have advanced considerably over the last few years, and machine intelligence has transitioned from laboratory novelty to practical machinery in several important applications. Consequently, ML/DL methods are important in transforming the security of IoT systems from merely facilitating secure communication between devices to security-based intelligence systems. The goal of this work is to provide a comprehensive survey of ML methods and recent advances in DL methods that can be used to develop enhanced security methods for IoT systems. IoT security threats that are related to inherent or newly introduced threats are presented, and various potential IoT system attack surfaces and the possible threats related to each surface are discussed. We then thoroughly review ML/DL methods for IoT security and present the opportunities, advantages and shortcomings of each method. We discuss the opportunities and challenges involved in applying ML/DL to IoT security. These opportunities and challenges can serve as potential future research directions.

543 citations

Journal ArticleDOI
20 Dec 2018-Sensors
TL;DR: A detailed and complex case-study has been presented to validate the solution in the context of a system that dynamically reverse the traveling direction of a road segment, with all the safety conditions in place.
Abstract: The new Internet of Things/Everything (IoT/IoE) paradigm and architecture allows one to rethink the way Smart City infrastructures are designed and managed, but on the other hand, a number of problems have to be solved. In terms of mobility the cities that embrace the sensoring era can take advantage of this disruptive technology to improve the quality of life of their citizens, also thanks to the rationalization in the use of their resources. In Sii-Mobility, a national smart city project on mobility and transportation, a flexible platform has been designed and here, in this paper, is presented. It permits one to set up heterogeneous and complex scenarios that integrate sensors/actuators as IoT/IoE in an overall Big Data, Machine Learning and Data Analytics scenario. A detailed and complex case-study has been presented to validate the solution in the context of a system that dynamically reverse the traveling direction of a road segment, with all the safety conditions in place. This case study composes several building blocks of the IoT platform, which demonstrate that a flexible and dynamic set-up is possible, supporting security, safety, local, cloud and mixed solutions.

449 citations

Journal ArticleDOI
TL;DR: It is argued that a mature adoption of IoT technologies in the building industry is not yet realized and, therefore, calls for more attention from researchers in the relevant fields from the application perspective.

267 citations

Journal ArticleDOI
TL;DR: This paper reviewed over 97 RPL-related academic research papers published by major academic publishers and presented a topic-oriented survey for these research efforts, finding that only 40.2% of the papers evaluate RPL through experiments using implementations on real embedded devices.
Abstract: RPL is the IPv6 routing protocol for low-power and lossy networks, standardized by IETF in 2012 as RFC6550. Specifically, RPL is designed to be a simple and inter-operable networking protocol for resource-constrained devices in industrial, home, and urban environments, intended to support the vision of the Internet of Things with thousands of devices interconnected through multihop mesh networks. More than four-years have passed since the standardization of RPL, and we believe that it is time to examine and understand its current state. In this paper, we review the history of research efforts in RPL; what aspects have been (and have not been) investigated and evaluated, how they have been studied, what was (and was not) implemented, and what remains for future investigation. We reviewed over 97 RPL-related academic research papers published by major academic publishers and present a topic-oriented survey for these research efforts. Our survey shows that only 40.2% of the papers evaluate RPL through experiments using implementations on real embedded devices, ContikiOS and TinyOS are the two most popular implementations (92.3%), and TelosB was the most frequently used hardware platform (69%) on testbeds that have average and median size of 49.4 and 30.5 nodes, respectively. Furthermore, unfortunately, despite it being approximately four years since its initial standardization, we are yet to see wide adoption of RPL as part of real-world systems and applications. We present our observations on the reasons behind this and suggest directions on which RPL should evolve.

221 citations