scispace - formally typeset
M

Mohammed Riyadh Abdmeziem

Researcher at University of the Sciences

Publications -  12
Citations -  282

Mohammed Riyadh Abdmeziem is an academic researcher from University of the Sciences. The author has contributed to research in topics: Key management & Computer science. The author has an hindex of 6, co-authored 9 publications receiving 224 citations. Previous affiliations of Mohammed Riyadh Abdmeziem include University of Lorraine & University of Science and Technology Houari Boumediene.

Papers
More filters
Book ChapterDOI

Architecting the Internet of Things: State of the Art

TL;DR: This chapter reviews the main proposed architectures for the Internet of Things, highlighting their adequacy with respect to IoT requirements, and introduces the high level architecture of IoT before diving into the details of each proposed architecture.
Journal ArticleDOI

An end-to-end secure key management protocol for e-health applications

TL;DR: A new lightweight key management protocol based on collaboration to establish a secure end-to-end communication channel between a highly resource constrained node and a remote entity and shows that its security properties are ensured.
Proceedings ArticleDOI

A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK)

TL;DR: This work introduces a novel decentralized and batch-based group key management protocol to secure multicast communications that reduces the rekeying overhead triggered by membership changes in dynamic and mobile groups and guarantees both backward and forward secrecy.
Proceedings ArticleDOI

Analytical evaluation of the impacts of Sybil attacks against RPL under mobility

TL;DR: In this paper, the authors introduce potential security threats on RPL, in particular Sybil attack when the Sybil nodes are mobile, and present an analytical analysis and a discussion on how network performances can be affected.
Book ChapterDOI

A Cooperative End to End Key Management Scheme for E-health Applications in the Context of Internet of Things

TL;DR: A new key management scheme is introduced that aims to establish session keys for highly resource-constrained nodes ensuring security protection through strong encryption and authentication means and demonstrates that the protocol provides strong security features while the scarcity of resources is taken into consideration.