M
Mohammed Riyadh Abdmeziem
Researcher at University of the Sciences
Publications - 12
Citations - 282
Mohammed Riyadh Abdmeziem is an academic researcher from University of the Sciences. The author has contributed to research in topics: Key management & Computer science. The author has an hindex of 6, co-authored 9 publications receiving 224 citations. Previous affiliations of Mohammed Riyadh Abdmeziem include University of Lorraine & University of Science and Technology Houari Boumediene.
Papers
More filters
Book ChapterDOI
Architecting the Internet of Things: State of the Art
TL;DR: This chapter reviews the main proposed architectures for the Internet of Things, highlighting their adequacy with respect to IoT requirements, and introduces the high level architecture of IoT before diving into the details of each proposed architecture.
Journal ArticleDOI
An end-to-end secure key management protocol for e-health applications
TL;DR: A new lightweight key management protocol based on collaboration to establish a secure end-to-end communication channel between a highly resource constrained node and a remote entity and shows that its security properties are ensured.
Proceedings ArticleDOI
A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK)
TL;DR: This work introduces a novel decentralized and batch-based group key management protocol to secure multicast communications that reduces the rekeying overhead triggered by membership changes in dynamic and mobile groups and guarantees both backward and forward secrecy.
Proceedings ArticleDOI
Analytical evaluation of the impacts of Sybil attacks against RPL under mobility
TL;DR: In this paper, the authors introduce potential security threats on RPL, in particular Sybil attack when the Sybil nodes are mobile, and present an analytical analysis and a discussion on how network performances can be affected.
Book ChapterDOI
A Cooperative End to End Key Management Scheme for E-health Applications in the Context of Internet of Things
TL;DR: A new key management scheme is introduced that aims to establish session keys for highly resource-constrained nodes ensuring security protection through strong encryption and authentication means and demonstrates that the protocol provides strong security features while the scarcity of resources is taken into consideration.