Mehdi Berenjkoub

Learn More
Internet key exchange (IKE) manages keys securely after they have been agreed upon and IKE exchanges the keys in an authenticated way. IKE has some deficiencies, the three most important of which are the excessive number of messages, IKE's vulnerability. to denial of service (DoS) and the complexity of IKE's specification. To solve these problems, some(More)
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security(More)
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity(More)
Key establishment is a critical security issue for wireless sensor networks. Due to resource constraints on the sensors, public key based protocols are not suitable. In addition, conventional symmetric encryption based protocols require significant sensor memory. In this paper, we propose a new hybrid key establishment protocol based on a scheme by Blom and(More)
Despite extensive research on flat ad hoc networks, meeting satisfactory security levels in sensor networks presents many problems. The main reason is that these networks are typically designed based on hierarchal structures. In this paper, we propose an efficient scheme for authentication and key management in hierarchical ad hoc sensor networks using(More)
Sensor networks have been proposed for military and scientific applications such as border security and environment monitoring. They are usually deployed in unattended and hostile environments, so security is a major concern. A fundamental requirement in wireless network security is the ability to establish keys between pairs of sensors. In this paper, we(More)
1389-1286/$ see front matter Crown Copyright doi:10.1016/j.comnet.2011.01.016 ⇑ Corresponding author. E-mail addresses: Fanian@ec.iut.ac.ir (A. Fanian (M. Berenjkoub), hsaidi@cc.iut.ac.ir (H. Saidi), (T. Aaron Gulliver). Key establishment among neighboring sensors is the most challenging issue for security services such as authentication and confidentiality(More)
This paper focuses on contention-based medium access control (MAC) protocols used in wireless local area networks. We propose a novel MAC protocol called adaptive backoff tuning MAC (ABTMAC) based on IEEE 802.11 distributed coordination function (DCF). In our proposed MAC protocol, we utilize a fixed transmission attempt rate and each node dynamically(More)
GSM is the most popular standard for wireless cellular networks with 3 billion handsets in use worldwide. One of the critical components in the GSM architecture is the authentication protocol. The current protocol has several drawbacks such as one- way entity authentication, memory overhead in the VLR and bandwidth consumption between the HLR and VLR.(More)
There are some security issues in Mobile Ad hoc Networks (MANETs) due to mobility, dynamic topology changes, and lack of any infrastructure. In MANETs, it is of great importance to detect anomaly and malicious behavior. In order to detect malicious attacks via intrusion detection systems and analyze the data set, we need to select some features. Hence,(More)