Mohammed Benabdellah - Academia.edu (original) (raw)

Papers by Mohammed Benabdellah

Research paper thumbnail of Machine Learning-Based Intrusion Detection System: Review and Taxonomy

Lecture notes in networks and systems, 2023

Research paper thumbnail of Blockchain-Based Trust and Security in Content-Centric Networking‒Based Internet of Things

Research paper thumbnail of Blockchain-Based PKI for Content-Centric Networking

Innovations in Smart Cities Applications Edition 2, 2019

Content Centric Networking (CCN) is a new communication architecture built on named data, created... more Content Centric Networking (CCN) is a new communication architecture built on named data, created to optimize network resources and ensure greater security. Due to its new architecture, CCN has several open security and privacy concerns. Today’s internet creates an encrypted end-to-end connection rather than securing content because content are opaque to the network. On the other hand, because of its separation from location, CCN claims to secure the content rather than the connection. In order to build trust between content providers and clients, content must be authenticated and integrity-protected. Since CCN relies on public key cryptography to protect confidentiality of the data and checking integrity and authentication processes, the public key management becomes a crucial issue for CCN security. In this paper, we address the security challenges related to key management, we propose a Decentralized Public Key Infrastructure (DPKI) used with Blockchain to counter the disadvantag...

Research paper thumbnail of Artificial Intelligence approaches for IoT Security: State of Art

International Journal of Advanced Engineering Research and Science

With an estimation of more than 35 billion interconnected smart devices by the end of 2021, Inter... more With an estimation of more than 35 billion interconnected smart devices by the end of 2021, Internet of Things (IoT) is one of the most rapidly growing technologies in the last decade. However, the complexity nature of IoT systems and the exponential amount of data collected and exchanged between Things relieve a big challenge in terms of security and privacy. Implementing classical security measures, such as encryption, authentication, access control, network and application security for IoT devices is no more effective against sophisticated Cyber-attacks. Artificial intelligence (AI) approaches such as Machine Learning (ML), Deep Learning (DL) and Blockchain can be leveraged to enhance the security of IoT and deal with its various problems. In this paper, we will describe the IoT technology and its domain of application, the protocols used to communicate between smart devices, security issues and existing AI solution.

Research paper thumbnail of BOUYAKHF. Groupe de recherche en Informatique, Intelligence Artificielle et Reconnaissance de Formes

A method for choosing reference images based on edge detection for video compression

Research paper thumbnail of Encryption-Compression Method of Images

The transmission and the transfer of images, in free spaces and on lines, must satisfy two object... more The transmission and the transfer of images, in free spaces and on lines, must satisfy two objectives which are: the reduction of the volume of information to free, the maximum possible, the public networks of communication, and the protection in order to ...

Research paper thumbnail of Computer modeling based on CSPs for managing personnel lack in courts

Applied Mathematical Sciences, 2013

Research paper thumbnail of Integration Des Tic Dans Les Facultes Des Sciences Juridiques, Economiques et Sociales

Il est actuellement reconnu que les Technologies d'Information et de Communication (TIC) modi... more Il est actuellement reconnu que les Technologies d'Information et de Communication (TIC) modifient de manière substantielle nos façons d'échange, de communication, d'apprentissage et de production. En plus des controverses qu'il a fait naître, le concept de société de l'information incarne ces évolutions qui préfigurent de nouveaux modes d'organisation sociale structurée autour des réseaux informatiques et de télécommunications. Les TIC connaissent de plus en plus des développements constatés, et sont introduites dans tous les secteurs. Ces dernières années, notre pays « le Maroc » s'est lancé dans un programme ambitieux qui vise la généralisation des TIC pour leur intégration dans le Système d'Éducation et de Formation. Dans cet article, nous allons abordé une stratégie à suivre concernant à la fois un programme d'études d'apprentissage et d'études propres consacré aux étudiants, et un programme de formation continue dédié pour les profes...

Research paper thumbnail of Security of Information Exchange Between Readers and Tags

Security and Privacy in Smart Sensor Networks, 2018

RFID (radio frequency identification) systems tend to be one of the most predominant computing te... more RFID (radio frequency identification) systems tend to be one of the most predominant computing technologies due to their low cost and their broad applicability. Latest technologies have brought costs down, and standards are being developed. Now the RFID technology is very important and essential. It is used for innovative applications in personnel services. RFID technology is based on tags, distance and frequency, communication mode, antenna and power transfer, and communication. The attacks are based on the way the RFID systems are communicating and the way that are transferred between the entities of an RFID network (tags, readers). Securing information exchange between readers and tags needs some cryptography methods like symmetric (affine method, block stream method, etc.) or asymmetric (RSA, ECC, etc.) key methods. In this chapter, the authors compare methods based on complexity and power. Then they choose the best for securing communication between RFID tags and RFID readers.

Research paper thumbnail of A method for choosing reference images based on edge detection for video compression

In this work, we propose carrying out tests on the encoding sequence of a video sequence to impro... more In this work, we propose carrying out tests on the encoding sequence of a video sequence to improve data flow and average PSNR. We experiment with the choice of reference images, in the process of video compression, by using only the intra and predicted images extracted from sequences. For each intra and predicted image, we perform edge detection. Each image of the sequence is compared with the other images by subtracting corresponding edges. The choice of the reference image is based on the result of subtraction. We adopt the criterion of minimum pixels if the resulting images present only points and the criterion of minimum distance between the lines if they present parallel lines and possibly points. Testing this approach on News and Kiss cool video sequences revealed an improvement in data flow and average PSNR as compared to the original encoding and choosing reference images based on the mean square error.

Research paper thumbnail of Adaptive compression of images based on wavelets

In most applications of image processing, the user is interested generally only in certain region... more In most applications of image processing, the user is interested generally only in certain regions of the image. In these cases, it is reasonable to consider adaptive processing of different regions in the image. In this work, we propose an adaptive image compression technique for still images using irreversible methods. After the selection of regions of interest, the approach consists in applying wavelet compression to these regions and classical JPEG image compression with losses to the context of the image. Testing this approach on images with regions of interest produced good results. Preliminary results revealed the superiority of adaptive compression in terms of compression ratio for comparable visual image quality. Moreover, when the context is compressed using JPEG, the wavelet method on regions of interest always outperforms the reversible LZ77 method in terms of compression ratio and visual image quality.

Research paper thumbnail of Chiffrement des Cartes MIFARE

La première application RFID est utilisée pendant la seconde guerre mondiale, parallèlement au dé... more La première application RFID est utilisée pendant la seconde guerre mondiale, parallèlement au développement de la radio et du radar (1935: Watson-Watt). En 1975, une démonstration de puissance réfléchie de tags RFID qui utilise UHF (Ultra Hautes Fréquences) et Micro-ondes. En 2003, l’EAN international, centre Auto-ID, UCC (Uniform Code Council) et les industriels créent le standard EPC (EPCGlobal version 1.0) intégrant les technologies RFID et internet pour mettre en place le réseau de traçabilité des objets utilisant les cartes et les étiquettes MiFare. MiFare classique est la puce la plus utilisée comme une carte sans contact dans le monde. On trouve plusieurs applications des cartes MiFare classiques tels que la chaine d’approvisionnement, la traçabilité des animaux, le contrôle d’accès, etc. Les méthodes de chiffrement utilisées sont : Crypto1, DES et AES. Crypto1 est un algorithme de cryptage développé par la société allemande NXP semiconductors spécialement pour les cartes et les étiquettes MiFare. Cet algorithme est implémenté dans un circuit intégré à l’intérieur de la puce électronique, pour avoir plus de rapidité des opérations de chiffrement. Crypto1 est basé sur le chiffrement de flux (chiffrement de VERMAN). L’authentification entre les cartes MIFARE et les lecteurs est décrite en trois passes, dont le lecteur est le premier qui commence cette opération d’authentification. Les cartes MIFARE utilise aussi les bits de parité pour que le message reçu ne contienne pas des erreurs de transmission par le canal. Quelques faiblesses découvertes tels que l’entropie est basse du générateur aléatoire, seulement les bits d’états impairs sont utilisés pour générer la clé de flux, les bits à gauche de LFSR non utilisés par le générateur de filtre, la faiblesse de parité et la réutilisation de masque jetable et la fuite d’information par la parité. Les cartes et étiquettes MIFARE sont fréquemment utilisées dans plusieurs domaine. Vu les faiblesses de cette technologie, nous travaillons à évoluer le chiffrement de flux en évitant de tomber sur ses faiblesses. Actuellement, nous cherchons la possibilité d’utiliser les courbes elliptiques pour augmenter le niveau de sécurité de la communication entres les Tags et les lecteurs RFID sur les cartes MIFARE.

Research paper thumbnail of Encryption-Compression of still images using the FMT transformation and the DES algorithm

The development of the applications related to several fields of image processing requires the us... more The development of the applications related to several fields of image processing requires the use of telecommunication and information technologies which evolved very quickly these last years. The compression and the encoding of data are two techniques whose importance believes in an exponential way in a myriad of applications. The use of the data-processing networks, for the transmission and the transfer of the data, must satisfy two objectives which are: the reduction of the volume of information to free, the maximum possible, the public networks of communication, and the protection in order to guarantee a level of optimum safety. For this we have proposed a new hybrid approach of encryption-compression, which is based on the DES encryption algorithm of the dominant coefficients, in a mixed-scale representation, of compression by the multi-scale transformation of Faber-Schauder. The comparison of this approach with other methods of encryption-compression, such as DCT-RSA and DCT-...

Research paper thumbnail of Georgian Electronic Scientific Journal: Computer Science and Telecommunications 2006|No.4(11) Encryption-Compression of still images using the FMT transformation and the DES

The development of the applications related to several fields of image processing requires the us... more The development of the applications related to several fields of image processing requires the use of telecommunication and information technologies which evolved very quickly these last years. The compression and the encoding of data are two techniques whose importance believes in an exponential way in a myriad of applications. The use of the data-processing networks, for the transmission and the transfer of the data, must satisfy two objectives which are: the reduction of the volume of information to free, the maximum possible, the public networks of communication, and the protection in order to guarantee a level of optimum safety. For this we have proposed a new hybrid approach of encryption-compression, which is based on the DES encryption algorithm of the dominant coefficients, in a mixed-scale representation, of compression by the multi-scale transformation of Faber-Schauder. The comparison of this approach with other methods of encryptioncompression, such as DCT-RSA and DCT-P...

Research paper thumbnail of A Key Establishment Attempt Based on Genetic Algorithms Applied to RFID Technologies

International Journal of Information Security and Privacy, 2021

In RFID technology, communication is based on random numbers, and the numbers used there are pseu... more In RFID technology, communication is based on random numbers, and the numbers used there are pseudo-random too (PRN). As for the PRN, it is generated by the computational tool that creates a sequence of numbers that are generally not related. In cryptography, we usually need to generate the encrypted and decrypted keys, so that we can use the genetic algorithm (GA) to find and present those keys. In this paper, the authors use the GA to find the random keys based on GA operators. The results of this generation attempt are tested through five statistical tests by which they try to determine the keys that are mostly responsible for message-encryption.

Research paper thumbnail of Classification and Watermarking of Brain Tumor Using Artificial and Convolutional Neural Networks

Artificial Intelligence and Industrial Applications, 2020

Machine Learning automatically creates analytical models that adapt to what is in the data. After... more Machine Learning automatically creates analytical models that adapt to what is in the data. After a while, the algorithm is used to deliver accurate results, whether it’s making smarter credit decisions, entering into retail deals, medical diagnostics, or detecting fraud. The use of Deep Learning technology as a new machine learning tool has experienced considerable success in digital image processing in recent years.

Research paper thumbnail of Security of Information Exchange Between Readers and Tags

RFID (radio frequency identification) systems tend to be one of the most predominant computing te... more RFID (radio frequency identification) systems tend to be one of the most predominant computing technologies due to their low cost and their broad applicability. Latest technologies have brought costs down, and standards are being developed. Now the RFID technology is very important and essential. It is used for innovative applications in personnel services. RFID technology is based on tags, distance and frequency, communication mode, antenna and power transfer, and communication. The attacks are based on the way the RFID systems are communicating and the way that are transferred between the entities of an RFID network (tags, readers). Securing information exchange between readers and tags needs some cryptography methods like symmetric (affine method, block stream method, etc.) or asymmetric (RSA, ECC, etc.) key methods. In this chapter, the authors compare methods based on complexity and power. Then they choose the best for securing communication between RFID tags and RFID readers.

Research paper thumbnail of Choice of Rererence Images for Video Compression

In this work, we experiment with the choice of reference images, in the process of video compress... more In this work, we experiment with the choice of reference images, in the process of video compression, by using only the intra and predicted images extracted from sequences. For intra and predicted image, we apply the Faber-schauder Multi-scale Transform (FMT). Then, each image is compared with the other images by subtracting corresponding images transformed by FMT. The choice of the best reference image is based on the result of subtraction. We adopt the criterion of minimum pixels if the resulting images present only points and the criterion of minimum distance between the curves if they present parallel linear or nonlinear curves, and possibly points. Testing this approach on video sequences revealed an improvement in data ∞ow and average PSNR as compared to the original encoding and choosing reference images based on the mean square error.

Research paper thumbnail of Smart Hospitals and Cyber Security Attacks

Digital Technologies and Applications, 2021

Until now, the Covid-19 pandemic was infected more than 37,167,291 people around the world in 212... more Until now, the Covid-19 pandemic was infected more than 37,167,291 people around the world in 212 countries and territories, killed 1,071,181 people since its appearance in December in Wuhan, of which more than 7,876,942 people in the United States, 6,979,434 people in the India and 5,057,958 people in Brazil (Novel Coronavirus (2019-nCoV) situation reports - World Health Organization (WHO), 2019 Novel Coronavirus (2019-nCoV) in the U.S -. U.S. Centers for Disease Control and Prevention (CDC), symptoms of Novel Coronavirus (2019-nCoV) – CDC, china Travel Advisory - U.S. State Department, accessed January 31, 2020.). This large number of infected people caused saturation in hospitals and put a big pressure on the intensive care units and hospital beds. While the medical staff are fighting to save the lives of these patients, others are playing with these lives by making cyber-attacks on research centers and health institutions, recently case was in September 2020, a woman in Germany ...

Research paper thumbnail of CCN Context-Naming for Efficient Context-Aware Service Discovery in IoT

Mobile, Secure, and Programmable Networking, 2019

The emergence of the Internet of Things (IoT) offers great potential for the development of new s... more The emergence of the Internet of Things (IoT) offers great potential for the development of new services and applications connecting the physical world to the virtual world. Due to the rapid growth and heterogeneity of connected objects, it is difficult for users to acquire precise knowledge about IoT services that can interact with. In order to effectively help end-users acquire services and data generated in the IoT, search and discovery mechanisms are crucial.

Research paper thumbnail of Machine Learning-Based Intrusion Detection System: Review and Taxonomy

Lecture notes in networks and systems, 2023

Research paper thumbnail of Blockchain-Based Trust and Security in Content-Centric Networking‒Based Internet of Things

Research paper thumbnail of Blockchain-Based PKI for Content-Centric Networking

Innovations in Smart Cities Applications Edition 2, 2019

Content Centric Networking (CCN) is a new communication architecture built on named data, created... more Content Centric Networking (CCN) is a new communication architecture built on named data, created to optimize network resources and ensure greater security. Due to its new architecture, CCN has several open security and privacy concerns. Today’s internet creates an encrypted end-to-end connection rather than securing content because content are opaque to the network. On the other hand, because of its separation from location, CCN claims to secure the content rather than the connection. In order to build trust between content providers and clients, content must be authenticated and integrity-protected. Since CCN relies on public key cryptography to protect confidentiality of the data and checking integrity and authentication processes, the public key management becomes a crucial issue for CCN security. In this paper, we address the security challenges related to key management, we propose a Decentralized Public Key Infrastructure (DPKI) used with Blockchain to counter the disadvantag...

Research paper thumbnail of Artificial Intelligence approaches for IoT Security: State of Art

International Journal of Advanced Engineering Research and Science

With an estimation of more than 35 billion interconnected smart devices by the end of 2021, Inter... more With an estimation of more than 35 billion interconnected smart devices by the end of 2021, Internet of Things (IoT) is one of the most rapidly growing technologies in the last decade. However, the complexity nature of IoT systems and the exponential amount of data collected and exchanged between Things relieve a big challenge in terms of security and privacy. Implementing classical security measures, such as encryption, authentication, access control, network and application security for IoT devices is no more effective against sophisticated Cyber-attacks. Artificial intelligence (AI) approaches such as Machine Learning (ML), Deep Learning (DL) and Blockchain can be leveraged to enhance the security of IoT and deal with its various problems. In this paper, we will describe the IoT technology and its domain of application, the protocols used to communicate between smart devices, security issues and existing AI solution.

Research paper thumbnail of BOUYAKHF. Groupe de recherche en Informatique, Intelligence Artificielle et Reconnaissance de Formes

A method for choosing reference images based on edge detection for video compression

Research paper thumbnail of Encryption-Compression Method of Images

The transmission and the transfer of images, in free spaces and on lines, must satisfy two object... more The transmission and the transfer of images, in free spaces and on lines, must satisfy two objectives which are: the reduction of the volume of information to free, the maximum possible, the public networks of communication, and the protection in order to ...

Research paper thumbnail of Computer modeling based on CSPs for managing personnel lack in courts

Applied Mathematical Sciences, 2013

Research paper thumbnail of Integration Des Tic Dans Les Facultes Des Sciences Juridiques, Economiques et Sociales

Il est actuellement reconnu que les Technologies d'Information et de Communication (TIC) modi... more Il est actuellement reconnu que les Technologies d'Information et de Communication (TIC) modifient de manière substantielle nos façons d'échange, de communication, d'apprentissage et de production. En plus des controverses qu'il a fait naître, le concept de société de l'information incarne ces évolutions qui préfigurent de nouveaux modes d'organisation sociale structurée autour des réseaux informatiques et de télécommunications. Les TIC connaissent de plus en plus des développements constatés, et sont introduites dans tous les secteurs. Ces dernières années, notre pays « le Maroc » s'est lancé dans un programme ambitieux qui vise la généralisation des TIC pour leur intégration dans le Système d'Éducation et de Formation. Dans cet article, nous allons abordé une stratégie à suivre concernant à la fois un programme d'études d'apprentissage et d'études propres consacré aux étudiants, et un programme de formation continue dédié pour les profes...

Research paper thumbnail of Security of Information Exchange Between Readers and Tags

Security and Privacy in Smart Sensor Networks, 2018

RFID (radio frequency identification) systems tend to be one of the most predominant computing te... more RFID (radio frequency identification) systems tend to be one of the most predominant computing technologies due to their low cost and their broad applicability. Latest technologies have brought costs down, and standards are being developed. Now the RFID technology is very important and essential. It is used for innovative applications in personnel services. RFID technology is based on tags, distance and frequency, communication mode, antenna and power transfer, and communication. The attacks are based on the way the RFID systems are communicating and the way that are transferred between the entities of an RFID network (tags, readers). Securing information exchange between readers and tags needs some cryptography methods like symmetric (affine method, block stream method, etc.) or asymmetric (RSA, ECC, etc.) key methods. In this chapter, the authors compare methods based on complexity and power. Then they choose the best for securing communication between RFID tags and RFID readers.

Research paper thumbnail of A method for choosing reference images based on edge detection for video compression

In this work, we propose carrying out tests on the encoding sequence of a video sequence to impro... more In this work, we propose carrying out tests on the encoding sequence of a video sequence to improve data flow and average PSNR. We experiment with the choice of reference images, in the process of video compression, by using only the intra and predicted images extracted from sequences. For each intra and predicted image, we perform edge detection. Each image of the sequence is compared with the other images by subtracting corresponding edges. The choice of the reference image is based on the result of subtraction. We adopt the criterion of minimum pixels if the resulting images present only points and the criterion of minimum distance between the lines if they present parallel lines and possibly points. Testing this approach on News and Kiss cool video sequences revealed an improvement in data flow and average PSNR as compared to the original encoding and choosing reference images based on the mean square error.

Research paper thumbnail of Adaptive compression of images based on wavelets

In most applications of image processing, the user is interested generally only in certain region... more In most applications of image processing, the user is interested generally only in certain regions of the image. In these cases, it is reasonable to consider adaptive processing of different regions in the image. In this work, we propose an adaptive image compression technique for still images using irreversible methods. After the selection of regions of interest, the approach consists in applying wavelet compression to these regions and classical JPEG image compression with losses to the context of the image. Testing this approach on images with regions of interest produced good results. Preliminary results revealed the superiority of adaptive compression in terms of compression ratio for comparable visual image quality. Moreover, when the context is compressed using JPEG, the wavelet method on regions of interest always outperforms the reversible LZ77 method in terms of compression ratio and visual image quality.

Research paper thumbnail of Chiffrement des Cartes MIFARE

La première application RFID est utilisée pendant la seconde guerre mondiale, parallèlement au dé... more La première application RFID est utilisée pendant la seconde guerre mondiale, parallèlement au développement de la radio et du radar (1935: Watson-Watt). En 1975, une démonstration de puissance réfléchie de tags RFID qui utilise UHF (Ultra Hautes Fréquences) et Micro-ondes. En 2003, l’EAN international, centre Auto-ID, UCC (Uniform Code Council) et les industriels créent le standard EPC (EPCGlobal version 1.0) intégrant les technologies RFID et internet pour mettre en place le réseau de traçabilité des objets utilisant les cartes et les étiquettes MiFare. MiFare classique est la puce la plus utilisée comme une carte sans contact dans le monde. On trouve plusieurs applications des cartes MiFare classiques tels que la chaine d’approvisionnement, la traçabilité des animaux, le contrôle d’accès, etc. Les méthodes de chiffrement utilisées sont : Crypto1, DES et AES. Crypto1 est un algorithme de cryptage développé par la société allemande NXP semiconductors spécialement pour les cartes et les étiquettes MiFare. Cet algorithme est implémenté dans un circuit intégré à l’intérieur de la puce électronique, pour avoir plus de rapidité des opérations de chiffrement. Crypto1 est basé sur le chiffrement de flux (chiffrement de VERMAN). L’authentification entre les cartes MIFARE et les lecteurs est décrite en trois passes, dont le lecteur est le premier qui commence cette opération d’authentification. Les cartes MIFARE utilise aussi les bits de parité pour que le message reçu ne contienne pas des erreurs de transmission par le canal. Quelques faiblesses découvertes tels que l’entropie est basse du générateur aléatoire, seulement les bits d’états impairs sont utilisés pour générer la clé de flux, les bits à gauche de LFSR non utilisés par le générateur de filtre, la faiblesse de parité et la réutilisation de masque jetable et la fuite d’information par la parité. Les cartes et étiquettes MIFARE sont fréquemment utilisées dans plusieurs domaine. Vu les faiblesses de cette technologie, nous travaillons à évoluer le chiffrement de flux en évitant de tomber sur ses faiblesses. Actuellement, nous cherchons la possibilité d’utiliser les courbes elliptiques pour augmenter le niveau de sécurité de la communication entres les Tags et les lecteurs RFID sur les cartes MIFARE.

Research paper thumbnail of Encryption-Compression of still images using the FMT transformation and the DES algorithm

The development of the applications related to several fields of image processing requires the us... more The development of the applications related to several fields of image processing requires the use of telecommunication and information technologies which evolved very quickly these last years. The compression and the encoding of data are two techniques whose importance believes in an exponential way in a myriad of applications. The use of the data-processing networks, for the transmission and the transfer of the data, must satisfy two objectives which are: the reduction of the volume of information to free, the maximum possible, the public networks of communication, and the protection in order to guarantee a level of optimum safety. For this we have proposed a new hybrid approach of encryption-compression, which is based on the DES encryption algorithm of the dominant coefficients, in a mixed-scale representation, of compression by the multi-scale transformation of Faber-Schauder. The comparison of this approach with other methods of encryption-compression, such as DCT-RSA and DCT-...

Research paper thumbnail of Georgian Electronic Scientific Journal: Computer Science and Telecommunications 2006|No.4(11) Encryption-Compression of still images using the FMT transformation and the DES

The development of the applications related to several fields of image processing requires the us... more The development of the applications related to several fields of image processing requires the use of telecommunication and information technologies which evolved very quickly these last years. The compression and the encoding of data are two techniques whose importance believes in an exponential way in a myriad of applications. The use of the data-processing networks, for the transmission and the transfer of the data, must satisfy two objectives which are: the reduction of the volume of information to free, the maximum possible, the public networks of communication, and the protection in order to guarantee a level of optimum safety. For this we have proposed a new hybrid approach of encryption-compression, which is based on the DES encryption algorithm of the dominant coefficients, in a mixed-scale representation, of compression by the multi-scale transformation of Faber-Schauder. The comparison of this approach with other methods of encryptioncompression, such as DCT-RSA and DCT-P...

Research paper thumbnail of A Key Establishment Attempt Based on Genetic Algorithms Applied to RFID Technologies

International Journal of Information Security and Privacy, 2021

In RFID technology, communication is based on random numbers, and the numbers used there are pseu... more In RFID technology, communication is based on random numbers, and the numbers used there are pseudo-random too (PRN). As for the PRN, it is generated by the computational tool that creates a sequence of numbers that are generally not related. In cryptography, we usually need to generate the encrypted and decrypted keys, so that we can use the genetic algorithm (GA) to find and present those keys. In this paper, the authors use the GA to find the random keys based on GA operators. The results of this generation attempt are tested through five statistical tests by which they try to determine the keys that are mostly responsible for message-encryption.

Research paper thumbnail of Classification and Watermarking of Brain Tumor Using Artificial and Convolutional Neural Networks

Artificial Intelligence and Industrial Applications, 2020

Machine Learning automatically creates analytical models that adapt to what is in the data. After... more Machine Learning automatically creates analytical models that adapt to what is in the data. After a while, the algorithm is used to deliver accurate results, whether it’s making smarter credit decisions, entering into retail deals, medical diagnostics, or detecting fraud. The use of Deep Learning technology as a new machine learning tool has experienced considerable success in digital image processing in recent years.

Research paper thumbnail of Security of Information Exchange Between Readers and Tags

RFID (radio frequency identification) systems tend to be one of the most predominant computing te... more RFID (radio frequency identification) systems tend to be one of the most predominant computing technologies due to their low cost and their broad applicability. Latest technologies have brought costs down, and standards are being developed. Now the RFID technology is very important and essential. It is used for innovative applications in personnel services. RFID technology is based on tags, distance and frequency, communication mode, antenna and power transfer, and communication. The attacks are based on the way the RFID systems are communicating and the way that are transferred between the entities of an RFID network (tags, readers). Securing information exchange between readers and tags needs some cryptography methods like symmetric (affine method, block stream method, etc.) or asymmetric (RSA, ECC, etc.) key methods. In this chapter, the authors compare methods based on complexity and power. Then they choose the best for securing communication between RFID tags and RFID readers.

Research paper thumbnail of Choice of Rererence Images for Video Compression

In this work, we experiment with the choice of reference images, in the process of video compress... more In this work, we experiment with the choice of reference images, in the process of video compression, by using only the intra and predicted images extracted from sequences. For intra and predicted image, we apply the Faber-schauder Multi-scale Transform (FMT). Then, each image is compared with the other images by subtracting corresponding images transformed by FMT. The choice of the best reference image is based on the result of subtraction. We adopt the criterion of minimum pixels if the resulting images present only points and the criterion of minimum distance between the curves if they present parallel linear or nonlinear curves, and possibly points. Testing this approach on video sequences revealed an improvement in data ∞ow and average PSNR as compared to the original encoding and choosing reference images based on the mean square error.

Research paper thumbnail of Smart Hospitals and Cyber Security Attacks

Digital Technologies and Applications, 2021

Until now, the Covid-19 pandemic was infected more than 37,167,291 people around the world in 212... more Until now, the Covid-19 pandemic was infected more than 37,167,291 people around the world in 212 countries and territories, killed 1,071,181 people since its appearance in December in Wuhan, of which more than 7,876,942 people in the United States, 6,979,434 people in the India and 5,057,958 people in Brazil (Novel Coronavirus (2019-nCoV) situation reports - World Health Organization (WHO), 2019 Novel Coronavirus (2019-nCoV) in the U.S -. U.S. Centers for Disease Control and Prevention (CDC), symptoms of Novel Coronavirus (2019-nCoV) – CDC, china Travel Advisory - U.S. State Department, accessed January 31, 2020.). This large number of infected people caused saturation in hospitals and put a big pressure on the intensive care units and hospital beds. While the medical staff are fighting to save the lives of these patients, others are playing with these lives by making cyber-attacks on research centers and health institutions, recently case was in September 2020, a woman in Germany ...

Research paper thumbnail of CCN Context-Naming for Efficient Context-Aware Service Discovery in IoT

Mobile, Secure, and Programmable Networking, 2019

The emergence of the Internet of Things (IoT) offers great potential for the development of new s... more The emergence of the Internet of Things (IoT) offers great potential for the development of new services and applications connecting the physical world to the virtual world. Due to the rapid growth and heterogeneity of connected objects, it is difficult for users to acquire precise knowledge about IoT services that can interact with. In order to effectively help end-users acquire services and data generated in the IoT, search and discovery mechanisms are crucial.