O
Omar Rafik Merad Boudia
Researcher at University of Oran
Publications - 10
Citations - 224
Omar Rafik Merad Boudia is an academic researcher from University of Oran. The author has contributed to research in topics: Encryption & Wireless sensor network. The author has an hindex of 6, co-authored 10 publications receiving 146 citations.
Papers
More filters
Journal ArticleDOI
A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography
TL;DR: This paper presents a novel secure data aggregation protocol for WSNs that employs Stateful Public Key Encryption (StPKE) and some previous techniques in order to provide an efficient end-to-end security.
Proceedings ArticleDOI
Token-Based Lightweight Authentication to Secure IoT Networks
Maissa Dammak,Omar Rafik Merad Boudia,Mohamed Ayoub Messous,Sidi-Mohammed Senouci,Christophe Gransart +4 more
TL;DR: A new Token-Based Lightweight User Authentication (TBL UA) for (IoT) devices is proposed, which is based on token technique in order to enhance the robustness of authentication.
Journal ArticleDOI
Elliptic Curve-Based Secure Multidimensional Aggregation for Smart Grid Communications
TL;DR: This paper proposes a scheme that considers multidimensional aggregation with privacy preserving and an efficient verification of smart grid data that is based on elliptic curve cryptography along with homomorphic encryption and without pairings.
Journal ArticleDOI
Context-aware access control and anonymous authentication in WBAN
TL;DR: This paper proposes a context-aware access control and anonymous authentication approach based on a secure and efficient Hybrid Certificateless Signcryption (H-CLSC) scheme that incorporates the merits of Ciphertext-Policy Attribute-Based Signcrypted and Identity-Based Broadcast Signc encryption in order to meet the security requirements and provide adaptive contextual privacy.
Journal ArticleDOI
Secure and efficient verification for data aggregation in wireless sensor networks
TL;DR: A scheme that provides the end‐to‐end privacy and allows early detection of the attack through a hop‐by‐hop verification, thus reducing the need to rely entirely on sink node for verification, is proposed and implemented.