M. ATTIR Azeddine

MCB

Directory of teachers

Department

Informatics Department

Research Interests

Specialized in Informatics Department. Focused on academic and scientific development.

Contact Info

University of M'Sila, Algeria

On the Web:

  • Google Scholar N/A
  • ResearchGate
    ResearchGate N/A
  • ORCID N/A
  • SC
    Scopus N/A

Recent Publications

2023-03-12

Lightweight anonymous and mutual authentication scheme for wireless body area networks

Wireless body area networks (WBANs) represent an important technology for e-health systems. They provide enhanced efficiency, more flexibility, and important cost savings for patients, healthcare providers, and medical professionals in home, as well as hospital settings. Mutual authentication with anonymity and session unlinkability belongs to an important class of authentication schemes for WBANs. Among the security schemes of this class, the scheme presented in Li et al. (2017) is seen as the lightest in terms of resource consumption. However, several recent papers reported that the scheme exhibits some problems with session unlinkability and forward secrecy of session keys. In this paper, we first present a security analysis of the Li et al. scheme and then propose a new security enhancement that ensures both session unlinkability and forward secrecy. Through a deep analysis, we show that the proposed scheme exhibits high robustness against well-known security attacks and prove its safety using the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool while assuring mutual authentication with BAN-logic. In terms of complexity, the proposed scheme exhibits a lower XOR and random number generation costs observed in Li et al. and other proposed schemes. Consequently, we have considered such costs in the proposed scheme and we shifted the costly random number generation function from the sensor node to the hub in order to enhance computation performance, energy consumption, and communication. Finally, we evaluated the proposed scheme using Castalia framework and demonstrated its high efficiency.
Citation

M. ATTIR Azeddine, ATTIR Azeddine, , (2023-03-12), "Lightweight anonymous and mutual authentication scheme for wireless body area networks", [national] Computer Networks , Elsevier

2022-02-08

Cryptanalysis of an Anonymous Mutual Authentication Protocol for Wireless Body Area Network

Wireless body area networks (WBANs) represent an important entity in E-health system, these networks offer enhanced efficiency, flexibility, and cost savings to patients, healthcare providers, and medical professionals in home- as well as hospital-based scenarios. The authentication of sensors is an essential security task. To the best of our knowledge, (Li et al, 2017) proposed the lightest authentication and key agreement scheme for WBAN. However, (M. Koya and Deepthi P. P, 2018) show that the Li et al. scheme is vulnerable to impersonation attack and they proposed to use the biokeys extracted from the inter pulse interval (IPI) to defend this attack. In this paper, we demonstrate that the M. Koya and Deepthi P. P scheme is vulnerable from sensor node spoofing attack hence, it does not provide anonymity. Subsequently we propose a security solution tackled with such vulnerability.
Citation

M. ATTIR Azeddine, (2022-02-08), "Cryptanalysis of an Anonymous Mutual Authentication Protocol for Wireless Body Area Network", [international] In Proceedings of the 11th International Conference on Sensor Networks , Portugal

2013-03-23

Braided Disjoint Branch Routing Protocol For WSNs

Wireless sensor networks operate typically in a low power low connectivity environment. Indeed, communications in such networks are unreliable because of nodes failures (battery depletion, physical damage, etc.), and loss of connectivity (obstacles, interference, etc.). The failure of sensor nodes should not affect the overall operation of the sensor network. In other words, the WSN design should be fault tolerant. At the routing level, disjoint and braided multipath routes are the most used approaches to increase fault tolerance in WSN. In this work, we exploit the advantages of the two approaches and propose a flexible method to construct a maximum number of paths. We demonstrate through simulations, that our solution outperforms the state-of-the-art solutions in terms of the number of paths per node and hence in terms of mean time to failure (MTTF).
Citation

M. ATTIR Azeddine, (2013-03-23), "Braided Disjoint Branch Routing Protocol For WSNs", [international] In Proc. 2013 Eighth International Conference on Broadband, Wireless Computing, Communication and Applications , France

2007-06-01

Logical Wormhole Prevention in Optimized Link State Routing Protocol

A particularly severe attack on routing protocols in ad hoc networks is the so-called wormhole attack in which two or more colluding attacking nodes record packets at one location, and tunnel them to another location for a replay at that remote location. When this attack targets specifically routing control packets, the nodes that are close to the attackers are in effect shielded from finding any alternative routes to the remote location with more than one or two hops, and thus all the routes will be directed to the wormhole established by the attackers. In optimized link state routing protocol (OLSR), if a wormhole attack is launched during the propagation of link state packets, the wrong link information will propagate throughout the network, leading to routing disruption. In this paper, we devise an efficient method to detect wormhole attacks in the OLSR protocol. This method tries to ascertain the effective presence of neighbors by employing an efficient neighborhood detection algorithm. Our method has several advantages since it does not require any time synchronization or location information and shows high detection rate under various scenarios.
Citation

M. ATTIR Azeddine, (2007-06-01), "Logical Wormhole Prevention in Optimized Link State Routing Protocol", [international] In Proc. 50th annual IEEE Global Telecommunications Conference (IEEE GLOBECOM) , USA

← Back to Researchers List