Zaid Kartit - Academia.edu (original) (raw)
Papers by Zaid Kartit
Advances in Science, Technology and Engineering Systems Journal, Mar 1, 2022
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to f... more The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc networks (MANET). Techniques and schemes have been proposed to secure the basic routing protocols in order to guarantee the availability of information routing services between network nodes. The majority of the solutions presented in the literature belong to two categories, namely those that use cryptographic techniques and those that use trust schemes. Given the characteristics of MANET networks, we need approaches that guarantee a level of honesty of the nodes to prevent possible routing attacks from malicious nodes. This study presents the security extensions of the basic routing protocols AODV, DSR and DSDV.A first part is devoted to extensions based on cryptography and a second part introduces extensions using trusted systems. Then we discussed and analyzed them while drawing up a comparative table to measure the effectiveness of the mechanisms used as well as the limits and strengths of each proposed extensions. In this study, we conclude that a new trust model that combines an access strategy with lightweight techniques must be developed to ensure honest node behavior can be a key to securing the routing protocol in MANET.
Cloud computing is the concept implemented to remedy the Daily Computing Problems. Cloud computin... more Cloud computing is the concept implemented to remedy the Daily Computing Problems. Cloud computing is basically virtual pool of resources and it provides these resources to users via internet. It offers a range of services for end users; among which there's Storage as a service. In recent years, Storage in Cloud gained popularity among both companies and private users. However, data privacy, security, reliability and interoperability issues still have to be adequately solved. But the most important problem is security and how cloud provider assures it. In this paper, we have proposed a simple, secure, and privacy-preserving architecture for inter-Cloud data sharing. This architecture is based on an encryption/decryption algorithm which aims to protect the data stored in the cloud from the unauthorized access.
In recent years, individuals and organizations have been using digital services created by digita... more In recent years, individuals and organizations have been using digital services created by digital transformation. With smart mobile devices, there is a lot of enthusiasm for providing users with the ability to shop, communicate, and access to information anytime and from anywhere. The Ad hoc mobile network (MANET) as an important wireless technology can be used to exploit these services. In consideration of the sensitivity of users' data routed through network nodes, secure routing must be the priority of MANET networks. Due to their characteristics such as a dynamic topology, a distributed control system, limited resources and multi-hop communication, these networks are particularly vulnerable to different security threats. This study present the security extensions for some basic routing protocol in MANET networks such as AODV, DSR, and DSDV, and we focus on analyzing the techniques and mechanisms developed to perform security services. Next, we propose an analysis and compar...
Wireless Communications and Mobile Computing
Internet of Things (IoT) is a hot and emerging topic nowadays. In the world of today, all kinds o... more Internet of Things (IoT) is a hot and emerging topic nowadays. In the world of today, all kinds of devices are supposed to be connected and all types of information are exchanged. This makes human daily life easier and much more intelligent than before. However, this life mode is vulnerable to several security threats. In fact, the mobile networks, by nature, are more exposed to malicious attacks that may read confidential information and modify or even drop important data. This risk should be taken in consideration prior to any construction of mobile networks especially in the coming 5G technology. The present paper aims to provide a contribution in securing such kinds of environment by proposing a new protocol that can be implemented in ad hoc networks.
The technological advancement in Wireless network has give the birth to a new generation of netwo... more The technological advancement in Wireless network has give the birth to a new generation of networks used in vehicle-to-vehicle or vehicle to road side unit communications to improve road safety by exchanging warning messages between neighbor vehicles or to offer new comfort services to road users.
Advances in Science, Technology and Engineering Systems Journal, Mar 1, 2022
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to f... more The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc networks (MANET). Techniques and schemes have been proposed to secure the basic routing protocols in order to guarantee the availability of information routing services between network nodes. The majority of the solutions presented in the literature belong to two categories, namely those that use cryptographic techniques and those that use trust schemes. Given the characteristics of MANET networks, we need approaches that guarantee a level of honesty of the nodes to prevent possible routing attacks from malicious nodes. This study presents the security extensions of the basic routing protocols AODV, DSR and DSDV.A first part is devoted to extensions based on cryptography and a second part introduces extensions using trusted systems. Then we discussed and analyzed them while drawing up a comparative table to measure the effectiveness of the mechanisms used as well as the limits and strengths of each proposed extensions. In this study, we conclude that a new trust model that combines an access strategy with lightweight techniques must be developed to ensure honest node behavior can be a key to securing the routing protocol in MANET.
Cloud computing is the concept implemented to remedy the Daily Computing Problems. Cloud computin... more Cloud computing is the concept implemented to remedy the Daily Computing Problems. Cloud computing is basically virtual pool of resources and it provides these resources to users via internet. It offers a range of services for end users; among which there's Storage as a service. In recent years, Storage in Cloud gained popularity among both companies and private users. However, data privacy, security, reliability and interoperability issues still have to be adequately solved. But the most important problem is security and how cloud provider assures it. In this paper, we have proposed a simple, secure, and privacy-preserving architecture for inter-Cloud data sharing. This architecture is based on an encryption/decryption algorithm which aims to protect the data stored in the cloud from the unauthorized access.
In recent years, individuals and organizations have been using digital services created by digita... more In recent years, individuals and organizations have been using digital services created by digital transformation. With smart mobile devices, there is a lot of enthusiasm for providing users with the ability to shop, communicate, and access to information anytime and from anywhere. The Ad hoc mobile network (MANET) as an important wireless technology can be used to exploit these services. In consideration of the sensitivity of users' data routed through network nodes, secure routing must be the priority of MANET networks. Due to their characteristics such as a dynamic topology, a distributed control system, limited resources and multi-hop communication, these networks are particularly vulnerable to different security threats. This study present the security extensions for some basic routing protocol in MANET networks such as AODV, DSR, and DSDV, and we focus on analyzing the techniques and mechanisms developed to perform security services. Next, we propose an analysis and compar...
Wireless Communications and Mobile Computing
Internet of Things (IoT) is a hot and emerging topic nowadays. In the world of today, all kinds o... more Internet of Things (IoT) is a hot and emerging topic nowadays. In the world of today, all kinds of devices are supposed to be connected and all types of information are exchanged. This makes human daily life easier and much more intelligent than before. However, this life mode is vulnerable to several security threats. In fact, the mobile networks, by nature, are more exposed to malicious attacks that may read confidential information and modify or even drop important data. This risk should be taken in consideration prior to any construction of mobile networks especially in the coming 5G technology. The present paper aims to provide a contribution in securing such kinds of environment by proposing a new protocol that can be implemented in ad hoc networks.
The technological advancement in Wireless network has give the birth to a new generation of netwo... more The technological advancement in Wireless network has give the birth to a new generation of networks used in vehicle-to-vehicle or vehicle to road side unit communications to improve road safety by exchanging warning messages between neighbor vehicles or to offer new comfort services to road users.