Papers by Oussama Harbouche
Résumé De nombreuses recherches et contributions sont apportées aux méthodologies orientées agent... more Résumé De nombreuses recherches et contributions sont apportées aux méthodologies orientées agent et sur les plate-formes de développement de systèmes multi-agents. Mais chacune de ces méthodologies définit ses propres concepts et la structure du système. Ces méthodologies permettent d'analyser des problèmes de différents domaines et développer des systèmes multi-agents mais la plupart d'entre elles ne fournissent pas un processus complet de développement (analyse, conception, implémentation et déploiement). Les plate-formes de développement de systèmes multi-agents fournissent un environnement d'exécution et de déploiement de ces systèmes. Mais nous remarquons que les plates-formes multi-agents ont des représentations et des concepts différents que celles adoptés par les méthodologies. Par conséquent, le développeur utilisant une méthodologie doit fournir un effort supplémentaire pour implémenter le système sur une plate-forme. En général, la majorité des méthodologies ...
In this paper, a secure and efficient protocol for vehicular ad hoc networks has been proposed th... more In this paper, a secure and efficient protocol for vehicular ad hoc networks has been proposed that ensures both message authentication and privacy preservation. As safety related message may contain life critical information, it is a necessity that the sender as well as the message are authentic. The proposed scheme is based on a secure elliptic curve digital signature algorithm approach. The proposed scheme supports conditional privacy, where the user's location can be revealed at the willingness of the user. Apart from this, the scheme is secure against attacks like DoS, Sybil and Grey/Black Hole attacks. From the comparison with previously proposed schemes, it is found that the proposed scheme as based on elliptic curve discrete logarithmic problem, outperforms existing algorithms based on integer factoring and discrete logarithmic problem.
In this paper, we propose a novel privacy-preserving location assurance protocol for secure locat... more In this paper, we propose a novel privacy-preserving location assurance protocol for secure location-aware services over vehicular ad hoc networks (VANETs). In particular, we introduce the notion of location-aware credentials based on “hash-sign-switch” paradigm so as to guarantee the trustworthiness of location in location-aware services while providing conditional privacy preservation which is a desirable property for secure vehicular communications. Furthermore, the proposed protocol provides efficient procedures that alleviate a burden of computation for location-aware signature generation and verification on vehicles in VANETs. In order to achieve these goals, we consider online/offline signature scheme and identity-based aggregate signature scheme as our building blocks. Finally, we demonstrate experimental results to confirm the efficiency and effectiveness of the proposed protocol.
Abstract In this paper, we propose a secure multimedia resource trading system in a vehicular ad ... more Abstract In this paper, we propose a secure multimedia resource trading system in a vehicular ad hoc network, leveraging a short-time self-certificate signature scheme. The short-time self-certificate signature does not need certificate verification overhead. Thus, it ...
The Sybil attack is one of the serious attacks to Vehicular Ad Hoc Networks (VANETs), because it ... more The Sybil attack is one of the serious attacks to Vehicular Ad Hoc Networks (VANETs), because it severely damages the security of VANETs and, even leads to a threat to lives of drivers and passengers. In this paper, we propose a solution to detect the Sybil attack based on the ...
... In sensor based VANET (S-VANET) issues like response time, data aging, bandwidth, packet deli... more ... In sensor based VANET (S-VANET) issues like response time, data aging, bandwidth, packet delivery, message prioritization and ... information using distributed sensor technology while prioritizing prevention of data aging, efficient quality-of-service (QoS) and robustness against ...
Vehicle ad-hoc networks (VANETs) are a prominent form of mobile ad-hoc networks. This paper outli... more Vehicle ad-hoc networks (VANETs) are a prominent form of mobile ad-hoc networks. This paper outlines the architecture of VANETs and discusses the security and privacy challenges that need to be overcome to make such networks practically viable. It compares the various security schemes that were suggested for VANETs. It then proposes an efficient implementation of an identity based cryptosystem that is robust and computationally secure.
Among civilian communication systems, vehicular networks emerge as one of the most is convincing ... more Among civilian communication systems, vehicular networks emerge as one of the most is convincing and yet most challenging instantiations of the mobile ad hoc networking technology. Towards the deployment of vehicular communication systems, security and privacy are critical factors and significant challenges to be met. This Vehicular communication (VC) system has the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment Nevertheless, Currently, Inter-Vehicle Communication systems (IVC) as well as vehicle to infrastructure communication is an emerging class of wireless communication, attracting considerable attention from the research community and the automotive industry also enabling mobile users in their vehicles to communicate to the road and with the roadside infrastructure. In this paper we are focusing on infrastructure to vehicle commutation. So in this paper we are focusing on real time experimental design of infrastructure to vehicle communication. We outline how VANET will be a better option than GPS technology. We also try to discuss IP address passing using DHCP in the network and the security issues.
Ad Hoc Networks, 2010
Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on ro... more Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before they are trusted while the real identity of vehicles should not be revealed, but traceable by authorized party. Existing solutions either rely heavily on a tamper-proof hardware device, or cannot satisfy the privacy requirement and do not have an effective message verification scheme. In this paper, we provide a software-based solution which makes use of only two shared secrets to satisfy the privacy requirement (with security analysis) and gives lower message overhead and at least 45% higher successful rate than previous solutions in the message verification phase using the bloom filter and the binary search techniques (through simulation study). We also provide the first group communication protocol to allow vehicles to authenticate and securely communicate with others in a group of known vehicles.
Vehicular Ad Hoc networks (VA NETs) are fast emerging as the dominant model for intelligent traff... more Vehicular Ad Hoc networks (VA NETs) are fast emerging as the dominant model for intelligent traffic control. In the recent years, increasing number of researchers investigated various privacy and security issues such as key management, TSllCOMS02194 978-1-4244-8943-5/11/$26.00 ©2011 IEEE
... During the Standby phase, there is no active MH-relevant event. In the occurrence of multiple... more ... During the Standby phase, there is no active MH-relevant event. In the occurrence of multiple concur-rent events, the applications maintain per-event phase and synopsis, but broadcast their synopses in the same beacon. Page 4. ...
We present an analysis of and security extensions to the CASCADE (Cluster-based Accurate Syntacti... more We present an analysis of and security extensions to the CASCADE (Cluster-based Accurate Syntactic Compression of Aggregated Data in VANETs) data aggregation technique. CASCADE organizes known vehicles into clusters, the size of which determines both the frame size used to distribute aggregated data and the distance ahead that vehicles are aware of (local view ). We determine the optimal cluster size to balance the trade-off between local view length and expected frame size. The original CASCADE description does not consider security issues, so we present our framework for a secure CASCADE by employing received signal strength and laser rangefinders for position verification.
International Journal of Molecular Sciences, 2010
Vehicle-to-vehicle communication among vehicular ad hoc networks (VANETs) plays an important role... more Vehicle-to-vehicle communication among vehicular ad hoc networks (VANETs) plays an important role in providing a high level of safety and convenience to drivers. Geographic routing protocol has been identified to be suitable for VANETs because of the special nature of such networks, e.g., frequently changed network topology and high dynamic mobility. There is considerable functional research about geographic routing, but the node location security issues have not been vastly concentrated on so far. While selecting every hop, the performance and security can be impacted severely by false position because of the position information importance for geographic routing. Making use of directional antennas, we propose a novel detection mechanism capable of recognizing nodes faking about their positions in beacon message. By checking through which directional antenna beacon messages are received, ones' neighborhood can be easily divided into two groups. In addition, combined with the three malicious node detection rules, nodes can efficiently detect malicious nodes around them after exchanging neighbors grouping information with each others. As the evaluation based on simulations shows, our position verification system can detect malicious nodes successfully and can prevent attacks on geographic routing by false position.
AbstractThis paper proposes a security framework with strong non-repudiation and privacy using n... more AbstractThis paper proposes a security framework with strong non-repudiation and privacy using new approach of ID-based cryptosystem in VANETs. To remove the overheads of certificate management in PKI, security frameworks using an ID-based cryptosystem are proposed. ...
Journal of Computer Security, 2007
Vehicular networks are very likely to be deployed in the coming years and thus become the most re... more Vehicular networks are very likely to be deployed in the coming years and thus become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made, which in some cases have more than mere technical implications. We provide a set of security protocols, we show that they protect privacy and we analyze their robustness and efficiency.
... XX, NO. XX, MONTH 200X 1 GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communi... more ... XX, NO. XX, MONTH 200X 1 GSIS: A Secure and Privacy Preserving Protocol for Vehicular Communications Xiaodong Lin, Student Member, IEEE, Xiaoting Sun, Pin-Han Ho, Member, IEEE, and Xuemin (Sherman) Shen, Senior Member, IEEE ...
Abstract-The security of Vehicular Ad Hoc Networks (VANET) has mostly directed the attention of t... more Abstract-The security of Vehicular Ad Hoc Networks (VANET) has mostly directed the attention of today research efforts, while comprehensive solutions to protect the network from adversary and attacks still need to be improved, trying to reach a satisfactory level, for the driver and ...
In this paper, we propose a secure and location assurance protocol in order to guarantee authenti... more In this paper, we propose a secure and location assurance protocol in order to guarantee authentication and to avoid illegal location tracking of vehicles in location-aware services over VANETs. In addition, the proposed protocol enables a message verifier to have confidence that the location-aware information was responded from the vehicles actually passed through the target location area without violating location privacy for responders. To achieve our security objectives, we use pseudonyms for privacy-preserving authentication and deploy a hierarchical identity-based signature scheme to achieve our security objectives. We also evaluate the performance of the proposed protocol.
IEEE Transactions on Vehicular Technology, 2012
Uploads
Papers by Oussama Harbouche