M. CHIKOUCHE Noureddine

Prof

Directory of teachers

Department

Informatics Department

Research Interests

IoT Security Cryptography

Contact Info

University of M'Sila, Algeria

On the Web:

  • Google Scholar N/A
  • ResearchGate
    ResearchGate N/A
  • ORCID N/A
  • SC
    Scopus N/A

Recent Publications

2025-01-28

An Efficient ECC-Based Authentication Protocol for Secure RFID Healthcare Applications

As Internet and Communication Technologies (ICT)
evolve, RFID (Radio Frequency Identification) has become essen-
tial in healthcare for efficiently tracking and managing tagged
medical devices. While RFID tags are extensively used on various
healthcare assets, they are exposed to serious security and privacy
risks, such as eavesdropping, data tampering, and interception,
which threaten the confidentiality of healthcare professionals and
patients. Despite the development of multiple lightweight RFID
authentication schemes, many still suffer from vulnerabilities
like replay, impersonation, and de-synchronization attacks. To
address these limitations, we present a robust and efficient
RFID authentication scheme designed specifically for IoT-enabled
healthcare applications. By integrating Elliptic Curve Cryptog-
raphy (ECC), our scheme delivers strong security with a low
computational footprint, ensuring resilience against all evaluated
attack types. Comprehensive security and performance testing
demonstrate that our protocol offers an effective balance of
security and efficiency, making it an ideal and secure choice
for real-time healthcare environments.
Citation

M. CHIKOUCHE Noureddine, (2025-01-28), "An Efficient ECC-Based Authentication Protocol for Secure RFID Healthcare Applications", [international] THE INTERNATIONAL SYMPOSIUM ON INNOVATIVE INFORMATICS OF BISKRA , universite de Biskra

2024-12-10

A new Authentication Protocol for RFID-based healthcare Application

With the rise of Internet and Communication Technologies (ICT), RFID (Radio Frequency Identification) technology has become indispensable in healthcare for tracking and managing tagged medical devices. Widely deployed across numerous healthcare assets, RFID tags face critical security and privacy challenges, as adversaries can eavesdrop, alter, or intercept transmitted data, compromising the confidentiality of healthcare personnel and patients. Although various lightweight RFID authentication schemes have been proposed to address these risks, many remain vulnerable to attacks, including replay, impersonation, and de-synchronization. To overcome these security limitations, we propose a resilient and efficient RFID authentication scheme tailored for IoT-enabled healthcare applications. Leveraging Elliptic Curve Cryptography (ECC) to ensure high security with minimal computational load, our scheme demonstrates strong resistance to all assessed attack vectors. Rigorous security and performance evaluations confirm that our protocol achieves an optimal balance of security and efficiency, positioning it as a practical and secure solution for real-time healthcare environments.
Citation

M. CHIKOUCHE Noureddine, (2024-12-10), "A new Authentication Protocol for RFID-based healthcare Application", [international] ISIA 2024 , Msila

2024-11-01

Emas: an efficient MLWE-based authentication scheme for advanced metering infrastructure in smart grid environment

Advanced metering infrastructure (AMI) plays a critical role in the smart grid by integrating metering systems with communication capabilities, especially for the industrial internet of things. However, existing authentication protocols have proven ineffective against quantum computing attacks and are computationally intensive since AMI contains limited computing components, such as smart meters. In this paper, we present a novel, efficient module learning with errors-based authentication and key agreement system for AMI, which we call EMAS. As part of the security measures of EMAS, Kyber Post-Quantum Public Key Encryption, a one-time pad mechanism, and hash functions are used. A formal and informal analysis of the security features is presented, showing that the proposed system is secure and resistant to known attacks. The performance analysis of our proposed EMAS on a B-L475E-IOT01A node equipped with a ARM Cortex M4 microcontroller shows that EMAS is more efficient than existing relevant schemes. About the computation time, EMAS takes 15.693 ms. This result is lower than other existing relevant schemes.
Citation

M. CHIKOUCHE Noureddine, (2024-11-01), "Emas: an efficient MLWE-based authentication scheme for advanced metering infrastructure in smart grid environment", [national] ournal of Ambient Intelligence and Humanized Computing , Springer

2024-07-01

Securing Cloud-based Healthcare Applications with a Quantum-resistant Authentication and Key Agreement Framework

A biosensor is a method for transmitting various physical phenomena, such as body temperature, electrocardiogram (ECG), pulse, blood pressure, electroencephalogram (EEG), and respiratory rate. This transmission occurs through the utilization of a Wireless Body Area Network (WBAN) when remotely diagnosing patients via Internet-of-Medical-Things (IoMT). However, the transmission of sensitive data from IoMT through WBAN via an insecure channel exposes it to various threats, necessitating the implementation of robust measures to guarantee security against potential adversaries. To address the security concerns associated with patient monitoring in healthcare systems and achieve the necessary security and privacy requirements during communication, a robust authentication framework is indispensable. Hence, it introduces an agile and robust post-quantum authentication framework for cloud-based healthcare applications, effectively mitigating the vulnerabilities identified in the recent literature. This framework is designed to protect against quantum attacks using the Kyber. A formal security verification of the proposed protocol is presented using AVISPA, as well as informally. Additionally, a comparison with the previous works is made regarding both performance and security. The comparison results conclusively show that our proposed framework is better regarding both measures.
Citation

M. CHIKOUCHE Noureddine, Sedat Akleylek, , (2024-07-01), "Securing Cloud-based Healthcare Applications with a Quantum-resistant Authentication and Key Agreement Framework", [national] Internet of Things , Elseivier

2023

An efficient privacy scheme for C-ITS stations

In Cooperative Intelligent Transport Systems (C-ITS), vehicles and Road Side Units (RSU) exchange various messages about safety, traffic control, and weather conditions. These messages are broadcast to all neighbors. Each message should be authenticated and should protect users’ privacy, mainly by hiding their locations. The authentication is achieved by signing messages using a private key related to the Pseudonym Certificate (PC), provided by a Trusted Authority (TA). The PC is delivered together with messages so that receivers can authenticate the messages. Privacy is ensured by changing PCs many times during a journey, so that trackers cannot get drivers’ traces. This paper proposes a novel approach to manage PC switching periods between vehicles. The proposed method uses a Common PC (CPC) during a short period before switching to a new PC. Vehicles use the same shared PC during this period to sign their messages. Simulations have been conducted in an OMNET++ environment, showing significant improvement in privacy protection compared to well-known privacy schemes.
Citation

M. CHIKOUCHE Noureddine, boubakeur.moussaoui@univ-msila.dz, Hacène Fouchal, , (2023), "An efficient privacy scheme for C-ITS stations", [national] Computers and Electrical Engineering , Elsevier

A novel image encryption algorithm based on hybrid chaotic maps using a key image

One of the most important data currently shared on the Internet is images of various sizes and types, gray and color, private and public, civilian and military, medical and scientific, commercial, and others. The biggest challenge and problem is the secure transmission of these images in this insecure environment. In this context, this paper proposes a new image encryption algorithm using a hybrid of three modified and improved chaotic one-dimensional (1D) maps to avoid the shortcomings of 1D maps and multidimensional (MD) maps. A key image is used to initialize the chaotic maps and is also used as a mask in the diffusion phase with the eXclusive OR (XOR) operator. The encryption process uses ExtraParam extracted from the original image, which is very sensitive to bit changes during the initialization of the chaotic maps. The proposed encryption process consists of two main phases: confusion and diffusion processes. The proposed image encryption algorithm has successfully passed numerous tests and cryptanalysis. We also measure the proposed algorithm with various analysis experiments such as histogram and entropy analysis, the number of pixel change rate (NPCR), the unified average changing intensity (UACI), the mean square error(MSE), the peak signal-to-noise ratio (PSNR) and Key Space. The experimental results and comparative analysis show that the proposed encryption algorithm has excellent performance, is strong enough to withstand various attacks, and provides excellent privacy to digital images.
Citation

M. CHIKOUCHE Noureddine, (2023), "A novel image encryption algorithm based on hybrid chaotic maps using a key image", [national] Optik , Urban & Fischer

2022

Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks: A Survey

Many applications are developed with the quick emergence of the Internet of things (IoT) and wireless sensor networks (WSNs) in the health sector. Healthcare applications that use wireless medical sensor networks (WMSNs) provide competent communication solutions for enhancing people life. WMSNs rely on highly sensitive and resource-constrained devices, so-called sensors, that sense patients’ vital signs then send them through open channels via gateways to specialists. However, these transmitted data from WMSNs can be manipulated by adversaries without data security, resulting in crucial consequences. In light of this, efficient security solutions and authentication schemes are needed. Lately, researchers have focussed highly on authentication for WMSNs, and many schemes have been proposed to preserve privacy and security requirements. These schemes face a lot of security and performance issues due to the constrained devices used. This paper presents a new classification of authentication schemes in WMSNs based on its architecture; as far as we know, it is the first of its kind. It also provides a comprehensive study of the existing authentication schemes in terms of security and performance. The performance evaluation is based on experimental results. Moreover, it identifies some future research directions and recommendations for designing authentication schemes in WMSNs.
Citation

M. CHIKOUCHE Noureddine, (2022), "Authentication Schemes for Healthcare Applications Using Wireless Medical Sensor Networks: A Survey", [national] SN Computer Science , Springer

2021

2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP)

With the progression in sensor technology and the low-cost electronic circuits’ proliferation, the Internet of Things (IoT) is emerging as a promising technology for enhancing people life in terms of making decisions and communicating with ease, especially in the healthcare domain, the IoT technology transforms the traditional hospital into a smart hospital enhanced with the benefit of using the sensors to get better diagnosis and monitoring to the patients, the patient data are collected and are sent through the internet to be analysed in the cloud, This produces growth in privacy and security risks such as sensitive data disclosure and using it in a bad way. Thus, privacy and security are considered as a challenge that needs to be addressed. In this paper, we present a new taxonomy of privacy preservation techniques in healthcare systems. In addition, we analyse and discuss several recent approaches that base on existing privacypreserving techniques.
Citation

M. CHIKOUCHE Noureddine, (2021), "2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP)", [international] Privacy preservation in healthcare systems , El Oued, Algeria

2020

EAP-SRES: An Enhanced Authentication Protocol for Secure Remote Education Systems Using NFC Technology

Radio Frequency Identification (RFID) and Near Field Communication (NFC) are wireless technologies applied in several domains, among which, remote education. The communication between different components of this system is unsecured, which may lead to several security and privacy problems. Designing authentication protocols to protect a remote education system in an open environment (e.g. NFC, RFID, and Internet) is a challenging task. Recently, Yang et al. proposed a mutual authentication protocol based on the hash function for RFID systems to secure this system. Yang et al. showed that their protocol is secure and can resist various attacks. This work proves that Yang et al.’s protocol does not achieve reader authentication, location privacy, and security forward. Furthermore, we propose an enhanced authentication protocol for secure remote education systems (EAP-SRES) using NFC technology. Our protocol is based on post-quantum cryptosystem to resist quantum attacks. Security analysis by using CL-AtSe (Constraint Logic based Attack Searcher) tool and Ouafi-Phan privacy model shows that the EAP-SRES protocol achieves the requirements of mutual authentication, untraceability and resists different possible attacks. In addition, EAP-SRES protocol is very efficient in term of performance.
Citation

M. CHIKOUCHE Noureddine, (2020), "EAP-SRES: An Enhanced Authentication Protocol for Secure Remote Education Systems Using NFC Technology", [national] International Journal of Computing and Digital Systems , University of Bahrain

2019

Simulation of Attacks on Authentication Protocols for Near Field Communications

Field Communication (NFC) technology is steadily becoming paramount due to its vast applications in domain of mobile services such as, payment, marketing, etc. The communication between the NFC tag and the NFC device is based on radio frequency which is unsecured. Several authentication protocols have been proposed to achieve the security requirements and to avoid different existing attacks (e.g. spoofing, denial of service, etc.). Recently, Beak and Youm proposed two versions of authentication protocol for NFC tag based services. Firstly, an NFC tag authentication protocol and the second is a NFC-enabled device authentication protocol.
In this paper, we analyse the security of these protocols using the automated tool. Through an automated security verification using the AVISPA (Automated Validation of
Internet Security Protocols and Applications) simulation tool, we prove that these protocols are not secure.
Citation

M. CHIKOUCHE Noureddine, (2019), "Simulation of Attacks on Authentication Protocols for Near Field Communications", [national] 2nd International Workshop on Cryptography and its Applications (2’IWCA’19) , Oran

Privacy Analysis of a New Authentication Protocol for Internet of Things

Nowadays, the Internet of Things (IoT) is an important technology that is applied in different applications, such as smart cities, supply chain, digital health monitors, etc. One of the most important challenges related to IoT technology is privacy. Recently, Wang et al. proposed a mutual authentication protocol in IoT environment, it was based on elliptic curve cryptography (ECC) and hash function. Wang et al. claimed that their protocol is secure against different attacks possible in IoT environment.
In this paper, we prove that their protocol does not provide untraceability and device anonymity. Moreover, we propose an improved protocol to eliminate the detected weaknesses. Using AVISPA simulation tool, we prove that our improved protocol satisfies security and privacy requirements.
Citation

M. CHIKOUCHE Noureddine, (2019), "Privacy Analysis of a New Authentication Protocol for Internet of Things", [international] International Workshop on Cryptography and its Applications (2’IWCA’19) , Oran

Performance Evaluation and Analysis of Encryption Schemes for Wireless Sensor Networks

Wireless sensor networks (WSNs) technology is one of the most important technologies of the Internet of things. It is effectively applied within several applications in the actual world, including health care, environmental monitoring, tracking, etc. WSNs consist of small sensor nodes having limited resources. The communication between the components of WSNs is unsecured though. Therefore, in order to secure the exchanged data, it is crucial to implement efficient and lightweight cryptographic schemes. In this paper, we evaluate the performance of different cryptosystems for WSNs. Our paper includes a comparison study between the studied encryption algorithms in terms of power consumption, required space memory, and computational time.
Citation

M. CHIKOUCHE Noureddine, Amar Abdelmalek Ghehioueche, Fares Mezrag, , (2019), "Performance Evaluation and Analysis of Encryption Schemes for Wireless Sensor Networks", [international] International Conference on Digitization (ICD-2019) Landscaping Artificial Intelligence , Skyline University College, Shareja, UAE

A privacy-preserving code-based authentication protocol for Internet of Things

The Internet of Things (IoT) is an upcoming technology that permits to interconnect different devices and machines using heterogeneous networks. One of the most critical issues in IoT is to secure communication between IoT components. The communication between the different IoT components is insecure, which requires the design of a secure authentication protocol and uses hardness cryptographic primitives. In 2017, Wang et al. proposed an improved authentication protocol based on elliptic curve cryptography for IoT. In this paper, we demonstrate that Wang et al.’s protocol is not secure. Additionally, we propose a privacy-preserving authentication protocol using code-based cryptosystem for IoT environments. The code-based cryptography is an important post-quantum cryptography that can resist quantum attacks. It is agreed in design several cryptographic schemes. To assess the proposed protocol, we carry out a security and performance analysis. Informal security analysis and formal security validation show that our protocol achieves different security and privacy requirements and can resist several common attacks, such as desynchronization attacks, quantum attacks, and replay attacks. Moreover, the performance evaluation indicates that our protocol is compatible with capabilities of IoT devices.
Citation

M. CHIKOUCHE Noureddine, Pierre-Louis Cayrel, El Hadji Modou Mboup, Brice Odilon Boidje, , (2019), "A privacy-preserving code-based authentication protocol for Internet of Things", [national] The Journal of Supercomputing , Springer US

2018

Performance Evaluation of Post-quantum Public-Key Cryptography in Smart Mobile Devices

The classical public-key schemes are based on number theory, such as integer factorization and discrete logarithm. In 1994, P.W. Shor proposed an algorithm to solve these problems in polynomial time using quantum computers. Recent advancements in quantum computing open the door to the possibility of developing quantum computers sophisticated enough to solve these problems. Post-quantum cryptography (PQC) is resistant against quantum attacks. The aim of this paper is to evaluate the performance of different post-quantum public-key schemes for constrained-resources smart mobile devices; and to give a comparison between the studied post-quantum schemes in terms of computational time, required memory, and power consumption.
Citation

M. CHIKOUCHE Noureddine, (2018), "Performance Evaluation of Post-quantum Public-Key Cryptography in Smart Mobile Devices", [international] Challenges and Opportunities in the Digital Era , Springer International Publishing , 978-3-030-02130-6

Code-Based Cryptosystems: A Comparative Study

1994, P.W. Shor showed that quantum computers will be able to break this class of cryptosystems. To avoid this weakness, we must use the post-quantum cryptography (PQC). PQC includes several categories: code-based cryptography, lattice-based cryptography, hash-based cryptography, multivariate-based cryptography, and
isogeny-based cryptography. Code-based cryptography is employed in construction of diverse cryptographic schemes and it does not need any cryptographic processor.
In this work, we review three important cryptosystems based on coding theory: McEliece, Niederreiter, and QC-MDPC McEliece cryptosystem. Our work includes a study comparative between the reviewed code-based encryption algorithms in terms of security and performance.
Citation

M. CHIKOUCHE Noureddine, (2018), "Code-Based Cryptosystems: A Comparative Study", [national] Workshops on Pure and Applied Mathematics (WPAM'2018) , M´sila

← Back to Researchers List